Skip to main content

Full text of "USPTO Patents Application 09870801"

See other formats


Intel-Trust Tech, Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 


^^^^^^ 

piss 



i es 

Lacy, Jack; Snyder, James; Maher, David; "Music on the Internet and the 
Intellectual Property Protection Problem" 

Y 

Yes 

'The PowerTV White Paper", powertv.com website, Oct. 11, 1996 

Y 

Yes 

Coutrot, Francois; Michon, Vincent; "A Single Conditional Access System for 
Satellite-Cable and Terrestrial TV" IEEE Transactions on Consumer Electronics, 
Vol. 35. No. 3. Aue. 1989 

Y 

Yes 

'ISO 8583: Financial transaction card originated messages * Interchange message 
specifications", ISO, Dec. 15, 1993 

Y 

Yes 

Harty, Kieran; Ho, Linda; "Case Study: The VISA Transaction Processing 
System", May 30, 1988 

Y 

Yes 

U.S. 4,584,639; Apr. 22, 1986 


Yes 

Denning, Dorothy E.; "Secure Personal Computing in an Insecure Network", 
Comm. of the ACM, Vol. 22, No. 8, Aug, 1979 


Yes 

Muftic, Sead; "Security Mechnisms for Computer Networks", Computer 
Communications and Networking, 1989 

Y 

Yes 

Kim, Gene H.; Spafford* Eugene H.; *The Design and Implementation of Tripwire: 
A File System Integrity Checker", COAST Laboratory, Purdue University, Nov. 
19, 1993 

Y 

Yes 

Choudhury, Abhijit K.; Maxcmchuk, Nicholas F.; Paul, Sanjoy; Schulzrinne, 
Henning G.; "Copyright Protection for Electronic Publishing Over Computer 
Networks", IEEE Network, May/Jun.. 1995 


Yes 

Dennine. Dorothv E.R.: Crvptoreraohv and Data Security. Addison-Wesley 
Publishing Company, 1982, Reprinted with corrections, Jan. 1983 


Yes 

Hellman; "Multi-user Cryptographic Techniques" 


Yes 

Diffle, Whitfield; Hellman, Martin E; "New Directions in Cryptography", Stanford 
University, 1976 

Y 

Yes 

Kohl, J.; Neuman, C; "The Kerberos Network Authentication Service (V5)'\ 
Network Working Group RFC 1510, Sep. 1993 


Yes 

Diffie, Whitfield; van Oorschot, Paul C; Weiner, Michael J.; "Authentication and 
Authenticated Key Exchanges", Sun Microsystems and Bell-Northern Research, 
Mar. 6. 1992 


I cs 

Diffie, Whitfield; "The First Ten Years of Public-Key Cryptography", Proceedings 
of the IEEE, Vol 76. No. 5, May. 1988 


Yes 

Kohnfeider, Loren M.; "Towards a Practical Public-Key Cryptosystem", May, 
1978 


Yes 

Kaliski, Jr., Burton S.; "A Layman's Guide to a Subset of ASN.l, BER, and DER", 
RSA Laboratories Technical Note, 1991. Revised Nov. 1. 1993 

Y 

Yes 

"PKCS #7: Cryptographic Message Syntax Standard", RSA Laboratories Technical 
Note, Ver. 1.5, Revised Nov. 1, 1993 


Yes 

Walker, Stephen; "Notes from RSA Data Security Conference", Trusted 
Information Systems, Jan. 18, 1994 

Y 

Yes 

Tygar, J.D.; Yee, Bennet; "Cryptography: It's Not Just for Electronic Mail 
Anymore", Carnegie Mellon University Tech. Report CMU-CS-93-107, Mar. 1, 
1993 


Yes 

U.S. 4,658,093; Apr. 14,1987 

Y 

Yes 

U.S. 4,405,829; Sep. 20, 1983 

Y 

Yes 

Schneier, Bruce; Applied Cryptography: Protocols, Algorithms, and Source Code 
in C. John Wiley & Sons, Inc., 1994 


* Any possible "Vs that were missed shall not negate the anticipatory nature of a reference, particularly where 
there js a chart in Appendix B. 1 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 




Y 

Yes 

Popek, Gerald J.; Kline, Charles S.; "Encryption and Secure Computer Networks". 
ACM Computing Surveys, Vol. 1 1 , No. 4, Dec. 1979 


Yes 

Diffie, Whitfield; Hellman, Martin E; "New Directions in Cryptography", Stanford 
University, 1976 


Yes 

Castano, Silvana; Fugini, Mariagrazia; Martella, Giancarlo; Samarati, Pierangela; 
Database Security. ACM Press, 1994 

Y 

Yes 

Thuraisingham, M.B.; "Mandatory Security in Object-Oriented Database Systems 0 , 
OOPSLA '89 Proceedings, ACM, Oct. 1-6. 1989 

Y 

Yes 

Olivier, Martin S.; von Solms, Sebastiaan H.; "A Taxomonmy for Secure Object- 
Oriented Databases", ACM Transactions on Database Systems, Vol. 19, No. 1, 
Mar. 1994 

Y 

Yes 

Olivier, M.S.; von Solms, S.H.; "Building a Secure Database Using Self-Protecting 
Objects", Computers & Security, Vol. 11, No. 3, 1992 

Y 

Yes 

Olivier, M.S.; von Solms, S.H.; "DISCO: A Discretionary Security Model for 
Object-oriented Databases", IT Security: The Need for International Cooperation, 
Elsevier Science Publishers B.V., 1992 

Y 

Yes 

Oliver, Martin S.; "Secure Object-oriented Databases* 1 , Thesis for the degree of 
Doctor of Philosophy in Computer Science, Rand Afrikaans University, Dec. 1991 


Yes 

R. Ahad, et al.; IRIS, 1992 

Y 

Yes 

ORION Llca. ITASCA, MCC-Austin TX & Itasca Corp., 1985-1995 

Y 

Yes 

Olivier, Martin S.; SECDB, 1990-1995 

Y 

Yes 

THOR: A Distributed Object-Oriented Database System". MIT 

Y 

Yes 

Miilen, Jonathan K.; Lunt, Teresa F.; "Security for Object-Oriented Database 
SYStems", IEEE 0-8186-2825-1; 1992 


Yes 

Choy, D.M. et al.; "A Digital Library System for Periodicals Distribution", May 
1996 

Y 

Yes 

Mathy, Laurent; "Features of The ACCOPI Multimedia Transport Service", 
Lecture Notes in Computer Science, No. 1045, Proc. Of European Workshop 
IDMS'96, Mar. 1996; 

"Access Control and COpyright Protection for Images Security Technology for 
Graphics and Communication Systems - RACE M1005: ACCOPI", webpage, 
Security Projects at Fraunhofer-IGD, 2002; 

ACCOPI RACE Project M1005 Warning of ACCOPI web pages removal, UCL 

T .flhrtrflfnjrfr Hp tftWrwrnni mirations ftt tftlfd* l t * rrinn 

Y 

Yes 

"The Amide Products" web page; 

"Forum on Technology-Based Intellectual Property Management - Electronic 
Commerce for Content", IMA Intellectual Property Proceedings, Vol. 2, Jun. 1996 

Y 

Yes 

Van Slype, Georges; "Natural Language Version of the generic CITED model ~ 
Vol. I: Presentation of the generic model, ver. 3.0"; and "Vol II: CITED usage 
monitoring system design for computer based applications, ver. 1.0", Project 5469, 
The CITED Consortium, Seo. 6. 1993 


* Any possible T's that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 2 


InterTrust Tech* Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Y 

Yes 

"Technological Strategies for Protecting Intellectual Property in the Networked 
Multimedia Environment*, IMA Intellectual Property Proceedings, Vol. 1, Issue 1, 
Jan. 1994 

Y 

Yes 

COPICAT - 8195: "Copyright Ownership Projection in Computer- Assisted 
Training", ESPRIT, Dec. 1993; 

Kelman, Alistair; "Electronic Copyright Management: Possibilities and Problems", 
Scientists for Labor Presentation, Nov. 14. 1996 

Y 

Yes 

Griswold, Gary N.; H A Method for Protecting Copyright on Networks", IMA 
Intellectual Property Proceedings, Vol 1, Issue 1, Jan. 1994 


Yes 

Erickson, John S.; *A Copyright Management System for Networked Interactive 
Multimedia", Proceedings of the 1995 Dartmouth Institute for Advanced Graduate 
Studies. 1995 


Yes 

Bums, Christopher; "AAP Draft: Local Access and Usage Controls", Association 
of American Publishers Report, Apr. 13, 1995 

Y 

Yes 

Choudhury, A.K.; Maxenchuk, N.F.; Paul, S.; Schulzrinne, H.G.; "Copyright 
Protection for Electronic Publishing over Computer Networks", Submitted to IEEE 
Network Magazine^ Jun. 1994 


Yes 

Wayner, Peter; Digital Copyright Protection, Academic Press, 1997 


Yes 

"Cryptolope Containers Technology: A White Paper", IBM InfoMarket Business 
Development Group 


Yes 

"Digital Rights Enforcement and Management: SuperDistribution of Cryptolopes", 
IBM 


Yes 

Kaplan, Marc A.; "IBM Cryptolopes, SuperDistribution and Digital Rights 
Management", IBM, Dec. 30, 1996 


Yes 

IP Workshop - CUPID: "Protocols and Services (ver. 1): An Architectural 
Overview", CNI, last update Nov. 20, 1997 

Y 

Yes 

Patent Application EP 0 567 800 Al; Nov. 3, 1993 

Y 

Yes 

Sibert, Olin; Bernstein, David; Van Wie, David; "The DigiBox: A Self-Protecting 
Container for Information Commerce", First USENIX Workshop on Electronic 
Commerce, Jul. 1 1-12, 1995 

Y 

Yes 

Willett, Shawn; "Metered PCs: Is your system watching you?; Wave Systems beta 
tests new technology", IDG Communications, Inc. InfoWorld, May 2, 1994 

Y 

Yes 

Weber, Robert; "Metering Technologies for Digital Intellectual Property - A 
Report to the International Federation of Reproduction Rights Organisations", 
International Federation of Reproduction on Rights Organisations, Northeast 
Consulting Resources, Inc.. Oct 1994 

Y 

Yes 

TULIP Final Report, ISBN 0-444-82540- 1 f 1991, revised Sep. 18, 1996 


Yes 

U.S, 5,634,012; May 27, 1997 


Yes 

U.S. 5,715,403; Feb. 3,1998 


Yes 

U.S. 5,845,281; Dec. 1, 1998 (For Priority, Feb. 1, 1995) 

Y 

Yes 

Brin, Sergey; Davis, James; Garcia-Molina, Hector; "Copy Detection Mechanism 
for Digital Documents", Stanford University 

Y 

Yes 

Weber, Robert; "Digital Rights Management Technologies - A Report to the 
International Federation of Reproduction Rights Organisations", Northeast 
Consulting Resources, Inc., Oct. 1995 


* Any possible "Vs that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 3 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

Erickson, John S.; "Rights Management Through Enhanced Attribution'*, Presented 
at INET 96 ProceedinRs. Jun., 1996 


Yes 

White* James E.; "Telescript; The Foundation for the Electronic Marketplace", 
Ver. 5.0, General Magic, Inc., Nov. 30, 1993 


Yes 

Ketchpel, Steve P.; Garria-Molina, Hector; Paepcke, Andreas; "Shopping Models: 
A Flexible Architecture for Information Commerce", Stanford University 


Vpc 

I es 

Lagoze, Carl; "A Secure Repository Design for Digital Libraries", D-Lib 
Magazine, Dec. 1995 

Y 
I 

i es 

"Introduction to Smart Cards v. 1.0", Gempius Card International, Mar, 21, 1991 


Yes 

Abadi, M.; Burrows, M.; Kaufman, C; Lampson, B.; "Authentication and 
Delegation with Smart-cards", Digital Equipment Corporation 

Y 

Yes 

Tygar, J.D.; Yee, Bennet; ''Dyad: A System for Using Physically Secure 
Coprocessors", IMA Intellectual Property Project Proceedings, Vol. 1, Issue 1, Jan. 
1994 


I Ca 

St Johns, M.; "Draft Revised IP Security Option", Network Working Group, RFC 
1038. Jan. 1988 


I Co 

Galvin, I; McCloghrie, K.; Davin, J.; "SNMP Security Protocols", Network 
Working Group RFC 1352. Jul., 1992 


Yes 

U.S. 5,163,091; Nov. 10, 1992 


Yes 

U.S. 5,355,474; Oct. 11 1994 

Y 

Yes 

U.S. 5,678,170; Oct. 14, 1997 


Yes 

U.S. 5,765,152; Jun. 9,1998 


Yes 

Shear. Victor; "Solutions for CD-ROM Pricing and Data Security Problems" 


Yes 

Williams, Tony; "Microsoft Object Strategy", Microsoft PowerPoint presentation, 
1990 

Y 

Yes 

"OLE 2.0 Draft Content Object Linking & Embedding", Microsoft, Jun. 5, 199 1 


Yes 

"Multimedia System Services Ver. 1.0", Hewlett-Packard, IBM, & SunSoft, 1993 


Yes 

Draft "Request for Technology: Multimedia System Services", Ver. 1.1, Interactive 
Multimedia Association Compatibility Proiect, Oct 16, 1992 


Yes 

Request tor Technology: Multimedia System oemces , ver. z.u, interactive 
Multimedia Association Compatibility Project, Nov. 9, 1992 


Yes 

Wobber, Edward; Abadi, Martin; Burrows, Mike; Lampson, Butler; 
"Authentication in the Taos Operating System", Digital Equipment Corporation, 
Dec. 10, 1993 


Yes 

Custer. Helen: Inside Windows NT. Microsoft Press, pages 26-42 and 329-330, 
1993 

Y 

Yes 

Dynamic linking of SunOS 

Y 

Yes 

Blaze, Matt, "A Cryptographic File System for Unix", preprint of paper to be 
presented at First ACM Conference on Communications and Computing Security, 
Nov. 3-5, 1993 


Yes 

Gamble, Todd; "Implementing Execution Controls in Unix", USENDC Association, 
Proceedings of the Seventh Systems Administration Conference (LISA VII), Nov, 
1-5, 1993 


* Any possible T's that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 4 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Y 

Yes 

Garfinkel. Simson: Soafford. Gene; Practical Unix Security. OReiliy & Associates, 
Inc., 1994 


Yes 

Blaze, Matt; loannidis, John; "The Architecture and Implementation of Network- 
Layer Security Under Unix", Columbia University and AT&T Bell Laboratories, 
1994 


Yes 

Sandhu, Ravi S.; "The Typed Access Matrix Model", Proceedings of TEES 
Symposium on Security & Privacy, May 4-6, 1992 


Yes 

Currv. David A.: Unix System Security: A Guide for Users and System 
Administrators, Addison- Wesley, 1992 

Y 

Yes 

FreeBSD System manager's Manual ,I LDCONFIG", Oct. 3, 1993 


Yes 

"Requirements for the Software License Management System", System 
Management Work Group. Rev. 3, Unix International, Jul. 23, 1992 

Y 

Yes 

Film canister 

Y 

Yes 

Safety deposit box 


Yes 

Central Point Anti-Vims, Central Point Software, 1993 


Yes 

Symantec Anti- Virus for Macintosh (a.k.a. SAM), Symantec, 1993 

Y 

Yes 

VirusCheck and VirusScan, McAfee, 1993 


Yes 

Goodman, Bill; Compactor Pro 


Yes 

Enigma V.25 


Yes 

Stufflt Deluxe v.1.5, v.3.0 f v.3 J, Aladdin Systems, 1988-1994 

Y 

Yes 

Harris, Jed; Ruben, Ira; "Bento Specification", Rev. 1.0d5, Apple Computer, Jul. 
15, 1993 


Yes 

Koenig, Andrew; "Automatic Software Distribution", USENIX Summer 
Conference Proceedings, Jun. 12-15, 1984 


Yes 

Microsoft Internet Explorer v.2.0 


Yes 

Think C: Obiect-Oriented Programmine Manual, Symantec Corporation, 1989 


Yes 

Think Pascal User Manual, Symantec Corporation, 1990 

Y 

Yes 

Mori, Ryoichi; Kawahara, Masaji; "Superdistribution: The Concept and the 
Architecture", The Transactions of the IEICE, Vol. E 73, No. 7, Jul., 1990 


Yes 

Epstein, Jeremy; Shugerman, Marvin; "A Trusted X Window System Server for 
Trusted Mach\ USENDC Association, Mach Workshop, Aug. 30. 1990 


Yes 

McCollum, Catherine J.; Messing, Judith R.; Notargiacomo, LouAnna; "Beyond 
the Pale of MAC and DAC -- Defining New Forms of Access Control", IEEE, 1990 


Yes 

Abrams, MarshaD D.; "Renewed Understanding of Access Control Policies", 
Proceedings of the 16th Computing National Security Conference, 1993 


Yes 

Blaze, Matt; Feigenbaum, Joan; Lacy, Jack; "Decentralized Trust Management", 
Proc. TREE Conference on Security and Privacy, May 1996 

Y 

Yes 

Chaum, David; "Achieving Electronic Privacy", Scientific American, Aug. 1992 


Yes 

UniverCD: The interactive, online library of product information from Cisco 
Systems, Cisco Systems, 1993 

Y 

Yes 

DCE 


Yes 

Fine, Todd; Minear, Spencer E.; "Assuring Distributed Trusted Mach", Secure 
Computing Corporation 


Yes 

U.S. 5,412,717; May 2, 1995 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 5 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






X cs 

Fugini, M.G.; Zicari, R.; "Authorization and Access Control in the Office-Net 
System", Computer Security in the Age of Information. IF1P, 1989 


Yes 

Abadi, M.; Burros, M.; Lampson. B.; Plotkin, G.; "A Calculus for Access Control 
in Distributed Systems", Digital Equipment Corporation, Feb. 28, 1991, revised 
Aup.28. 1991 

Y 

Yes 

Lampson, Butler; Abadi, Martin; Burrows, Michael; Wobber, Edward; 
"Authentication in Distributed Systems: Theory and Practice", Digital Equipment 
Corporation, 1992 


Yes 

Rivest, Ronald L.; Lampson, Butler; "SDSI - A Simple Distributed Security 
Infrastructure". MIT and Microsoft Corporation, Apr. 30, 1996 


Yes 

Thompson, Victoria P.; Wentz, R Stan; "A Concept for Certification of an Army 
MLS Management Information System", Proceedings of the 16th National 
Computer Security Conference. Sep. 20-23. 1993 


Yes 

Frederick, Keith P.; "Certification and Accreditation Approach", Air Force 
Crvptoloeic Support Center (OL-FP) 

Y 

Yes 

PCT Application WO 96/27155; Published Sep. 6, 1996 


Yes 

U.S. 5,910,987; Jun. 8, 1999 

Y 

Yes 

Rozenblit, Moshe; "Secure Software Distribution", IEEE 0-7803-181 1-0/94, 1994 

Y 

Yes 

Stefik. Mark: Internet Dreams: Archetypes. Myths, and Metaphors. "Letting Loose 
the Light: Igniting Commerce in Electronic Publication", The MIT Press, 1996 


Yes 

AT&TPersonaLink, [Before Feb. 13, 19951 


Yes 

Neuman, B. Clifford; "Proxy-Based Authorization and Accounting for Distributed 
Systems", Proceedings of the 13th Infl Conference on Distributed Computing 
Systems, May 1993 — 

Y 

Yes 

Tygar, J.D.; Yee, Bennet S.; (R. Rashid, ed.); "Strongbox: A System for Self- 
Securing Programs'* 


Yes 

Yee, Bennet; Tygar, J.D.; "Secure Coprocessors in Electronic Commerce 
Applications", Proceedings of the First USENIX Workshop on Electronic 
Commerce, Jul. 1995 


Yes 

U.S. 4,278,837; Jul. 14, 1981 


Yes 

U.S. 3,806,874; Apr. 23, 1974 

Y 

Yes 

U.S. 4,748.561; May 31, 1988 

Y 

Yes 

U.S. 4,796,220; Jan. 3, 1989 


Yes 

U.S. 4,817,140; Mar. 28, 1989 

Y 

Yes 

U.S. 4,866,769; Sep. 12, 1989 

Y 

Yes 

U.S. 5,014,234; May 7, 1991 

Y 

Yes 

U.S. 5.113,518; May 12, 1992 


Yes 

U.S. 5,204,897; Apr. 20, 1993 


Yes 

U.S. 5,218,605; Jun. 8, 1993 

Y 

Yes 

U.S. 5,260,999; Nov. 9. 1993 

Y 

Yes 

U.S. 5,291,598; Mar. 1,1994 

Y 

Yes 

U.S. 5,337,357; Aug. 9, 1994 


Yes 

U.S. 5,421,006; May 30, 1995 


Yes 

U.S. 5,438,508; Aug. 1, 1995 


Yes 

U.S. 5,490 t 216;Feb. 6, 1996 

Y 

Yes 

U.S. 5,603,031; Feb. 11,1997 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 6 


InterTrust Tech, Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 




I ; ;>:'-(. : ■ ■ y: \".. '•'}':'). 


Yes 

U.S. 5,692,047; Nov. 25, 1997 


Yes 

U.S. 5,724,425; Mar. 3, 1998 


Yes 

U.S. 5,940,504; Aug. 17,1999 


Yes 

U.S. 5,978,484; Nov. 2, 1999 


Yes 

U.S. 6,016,393; Jan. 18,2000 


Yes 

Woo, Thomas Y.C.; Lam, Siman S.; "A Framework for Distributed Authorization", 
IstConf Comnuter & romnL Securitv ACM Nov 1993 


Yes 

Sandhu, Ravi S.; Suri, Gurpreet S.; "Implementation Considerations for the Typed 
At^epft Matrix Model in a Distributed Fnvironment* Proc Of the 15th National 


Yes 

O'Conner, Mary Ann; "New Distribution Options for Electontc Publishers; iOpencr 
Data Encryption and Metering System for CD-ROM Use", CD-ROM Professional, 
Vol 7. No. 2. ISSN 1409-0833, Mar. 1994 


Yes 

Herzberg, A; Karmi, G; "On Software Protection", Proceedings of the 4th 
Jerusalem Conference on Information Technology (JCIT), BSE Computer Society 
Press, Apr. 1984 


Yes 

Smith, Mary Grace; Weber, Robert; "A New Set of Rules for Information 
Commerce* Riffhts-Protection Technologies and Personalized -Information 
Comerce Will Affect All Knowledge Workers", CommunicationsWeek, Nov. 6, 

tyy3 — 

Y 

Yes 

DOD "Rainbow Series" 


Yes 

Rosenthal, Doug; "EINet: A Secure, Open Network for Electronic Commerce". 
IEEE, 1994 

Y 

Yes 

Patent Application EP 0 367 700 A2; May 9, 1990 

Y 

Yes 

Hauser, R.; Bauknecht, K.; "LTTP Protection ~ A Pragmatic Approach to 
Licensing", Institut fur Informatik, Univcrsitat Zurich, Jan. 13, 1994 


Yes 

"Multimedia Mixed Object Envelopes Supporting a Graduated Fee Scheme via 
Encryption"; IBM Technical Disclosure Bulletin, Vol. 37, No. 3, Mar. 1994 


Yes 

Cox, Brad; ''No Silver Bullet Revisted", American Programmer Journal, Nov. 1995 


Yes 

"Privacy and the NH: Safeguarding Telecommunications-Related Personal 
Information", U.S. Dept. of Commerce, Oct 1995 


Yes 

Joseph Ebersole, Protecting Intellectual Property Rights on the Information 
oupernignways, Mar. iyy4 

Y 

Yes 

Herzberg, Amir; Printer, Shlomit S.; "Public Protection of Software", ACM 
Transactions on Computer Systems, Vol. 5, No. 4, Nov. 1987 


Yes 

Hickman, Kipp E.B.; SSL 2.0 Protocol Specification 


Yes 

Gosler. James: "Software Protection: Mvth or Realitv". Lecture Notes in Computer 
Science, Advances in Crvotoloev - CrvDto '85 Proceedings, 1985 


Yes 

Aucsmith, David; "Tamper Resistent Software: An Implementation", IAL 


Yes 

U.S. Patent No. 5,671,279; Sept 23, 1997 

Y 

Yes 

Kahn, Robert; Wilensky, Robert; "A Framework for Distributed Digital Object 
Services". Corporation for National Research Initiatives, Mav 13. 1995 

Y 

Yes 

Gasser, Morrie; Goldstein, Andy; Kaufman, Charlie; Lampson, B; "The Digital 
Distributed Svstem Security Architecture". Proceedings of 1989 National 
Computer Security Conference, 1989 


* Any possible Ts that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 7 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Y 

Yes 

Neuman, B. Clifford; Ts'o, Theodore; "Kerberos: An Authentication Service for 
Computer Networks", IEEE Communications Magazine. Sep. 1994 


Yes 

Reiher, Peter; Page, Jr., Thomas; Popek, Gerald; Cook, Jeff; Crocker, Stephen; 
"Truffles — Secure File Sharing With Minimal Svstem Administrator Intervention". 
UCLA, Trusted Information Systems 

Y 

Yes 

Reiher, Peter; Page, Jr., Thomas; Popek, Gerald; Cook, Jeff; Crocker, Stephen; 
"Truffles — A Secure Service for Widespread File Sharing" , UCLA, Trusted 
Information Systems 

Y 

Yes 

"ISO, Open Systems Interconnection: Security Architecture, ISO 7498/1", 1988 

Y 

Yes 

"ISO, Open Systems Interconnection: Security Architecture, ISO 7498/2", ISO, 
1988 


Yes 

U.S. 5,222,134; Jun. 22, 1993 


Yes 

Rindfrey, Jochen; "Security in the World Wide Web", Fraunhofer Institute for 
Computer Graphics, Dec. 1996 


Yes 

Finin, Tim; Fritzson, Rich; McKay, Don; "A Language and Protocol to Support 
Intelligent Agent Interoperability", Proceedings of the CE & CALS Washington '92 

Y 

Yes 

Winslet, Marianne; Smith, Kenneth; Qian, Xiaolei; "Formal Query Languages for 
Secure Relational Databases", ACM Transactions on Database Systems, Vol. 19, 
Nn 4 Dee 1994 


Yes 

Jones, V.E.; Ching, N.; Wtnslett, M.; "Credentials for Privacy and Interoperation", 
ITntver^itv of Illinois at Urbana-ChaninaieTi 


Yes 

Greenwald, Steven J.; Newman-Wolfe, Richard E.; "The Distributed Compartment 
Model for Resource Management and Access Control" , Technical Report Number 
TR94-035 The University of Florida Oct 1994 

Y 

Yes 

Moffett, Jonathan D.; "Delegation of Authority Using Domain-Based Access 
Rules", thesis, Imperial College of Science, Technology & Medicine, University of 
London, Jul., 1990 

Y 

Yes 

Lagoze, Carl; McGrath, Robert; Overly, Ed; Yeager, Nancy; "A Design for Inter- 
Operable Secure Object Stores (ISOS)", Cornell University, NCSA, CNRI, Nov. 7, 
1995 


Yes 

Aharonian, Gregory; "Software Patents - Relative Comparison of EPO/PTO/JPO 
Software Searching Capabilities", Source Translation & Optimization 


Yes 

Gaster, Jens L.; "Authors' Rights and Neighbouring Rights in the Information 
Society", DG XV/E/4, European Coinmission 


Yes 

"Europe and The Global Information Society Recommendations to the European 
Council", Bamgemann Report, www.medicif.org web pages, Global Information 
Society, Mav, 26, 1994 


Yes 

Bernstein, David; Lenowitz, Erwin; "Copyrights, Distribution Chains, Integrity, and 
Privacy: The Need for a Standards-Based Solution", Electronic Publishing 
Resources 


Yes 

Rubin, A.D.; Honeyman, P.; "Long Running Jobs in an Authenticated 
Environment", CHI Technical Report 93-1, Center for Information Technology 
Integration, Mar. 29, 1993 


Yes 

Sammer. Peter; Ausserhofer, Andreas; "New Tools for the Internet", Joanneum 
Research, Graz University of Technology 


* Any possible w Y n s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 8 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 




f.:'? y -.^ .: -.^i "iw£00 : ;•■ :: '".If V^-vl 


Yes 

Eizenberg, Gerard, "Contribution of Information Technology Security to 
Intellectual Property Protection" , CERT-DERI 


Yes 

Antonelli, C.J.; Doster, W.A.; Honeyman, P.; "Access Control in a Workstation- 
Based Distributed Computing Environment", CITI Technical Report 90-2, Jul. 17, 
1990 


Yes 

Lord, SP.; Pope, N.H.; Stepney, Susan; "Access Management in Multi- 
Administration Networks" THE 2nd International Conference on Secure 
Communication Systems, 1986 


Yes 

Stennev Susan* Lord S ten hen P * "Formal Snecification of an Access Control 
System", Software-Practice and Experience, Vol 17(9), 1987 


Yes 

Brunnstein, Klaus; Sint, Peter P.; "Intellectual Property Rights and New 
Technologies", Proceedings of the KnowRight'95 Conference, Aur. 1995 


Yes 

Rubin, A.D.; Honeyman, P.; "Formal Methods for the Analysis of Authentication 
Protocols CITI Technical Report 93-7", Center for Information Technology 
Integration Nov 8 1993 


Yes 

Lexis/WestLaw 

Y 

Yes 

U.S. 6,135,646; Oct. 24, 2000 


Yes 

Bishop, Matt; "Privacy-Enhanced Electronic Mail", Privacy and Security Researh 
Groun TAB 

Y 

Yes 

Kim, Won; Ballou, Nat; Chou, Hong-Tai; Garza, Jorge R; Woelk, DarreU; 
"Features of the ORION Object-Oriented Database System" 


Yes 

"Key Management Using ANSI X9.17", Federal Information Processing Standards 
Publication 171, U.S. Department of Cbnnnerce, Apr. 27. 1992 


Yes 

"S/PAY: RSA's Developer's Suite for Secure Electronic Transactions (SET)", RSA 
Data Security, Inc. 1997 


Yes 

Perlman, Bill; "A Working Anti-Taping System for Cable Pay-Per-View", IEEE 
Trans. On Consumer Electronics, Vol. 35, No. 3, Aug. 1989 

Y 

Yes 

Organick, Elliott I.; "The Multics System: An Examination of Its Structure*, MIT 
Press, 1972 

Y 

Yes 

Cina Jr., Vincent J.; White, Star R.; Comerford, Liam; "ABYSS: A Basic 
Yorktown Security System PC Software Asset Protection Concepts", IBM 
Research Report Number RC 12401, IBM Thomas J. Watson Research Center, 
Dec. 18. 1986 

Y 

Yes 

White, Steve R.; Comerford, Liam; "ABYSS: An Architecture for Software 
Protection", IEEE Transactions on Software Engineering, Vol. 16, No. 6, Jun. 1990 

Y 

Yes 

Davies. D.W.: Price. W.L.: Security for Computer Networks. John Wilev & Sons. 
1984 


Yes 

"MSDN - INF: LAN Manager 2,1 Server Autotuning (Part 2)", PSS ID Number 
080078, Microsoft. Feb. 1993 

Y 

Yes 

"MSDN - License Service Application Prograrnming Interface", API Specification 
vl .02, Microsoft Jan. 1993 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 9 


InterTnist Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

"International Infrastructure Standards Panel: 
IISP Need #31 - Containers or Secure Packaging; 
IISP Need #32 - Authentication of Content; 
IISP Need #33 - Control Enforcement; 
IISP Need #34 - Billing and Payment; 
IISP Need #35 - Reporting" 

AKTQT fVitm* 3*>n 1ft 100^ 

Y 

Yes 

"Cryptographic API Specification", Version 0.6, Microsoft, Mar. 1995 


Yes 

Everett David B.: "Smart Card Tutorial - Part 1", Sep. 1992 

Y 

Yes 

Paradinas, Pierre; Vandewalle, Jean-Jacques; "New Directions for Integrated 
Circuit Cards Operating Systems" 

Y 

Yes 

Hauser, Ralf; "Control of Information Distribution and Access", Dissertation Der 
Wirtschaftswissenschaftlichen Fakultat Der Universitat Zurich, May 31, 1995 


Yes 

Rindfrey, Jochen; "Towards an Equitable System for Access Control and Copyright 
Protection in Broadcast Image Services: The Equicrypt Approach *\ Fraunhofer 
Institute for Computer Graphics 


Yes 

Wells. Rob: Odvssev of Plastic Purchase: 20-Second Round-Trip, Associated 
Press, Dec. 1993 


Yes 

Pavment Systems: Strategic Choices for the Future. Hitachi Research Institute; 
Institute of Advanced Business Systems, Hitachi, Ltd., 1993 


Yes 

"EFT Network Data Book - 1993 Edition", Bank Network News, Vol. 11, No. 13, 
Nov. 1992 


Yes 

"American National Standard: Specification for Financial Message Exchange 
Between Card Acceptor and Acquirer, X9.15", American Banker's Association, 
1990 


Yes 

"ISO 7813-1987 Identification Cards - Financial Transaction Cards", ISO, 1987 

Y 

Yes 

MSDN Issue: Summer 1992; Vol. No.: 0 (Beta); 1 Disk, Microsoft, 1992 

Y 

Yes 

MSDN Issue: Sep. 1992; Vol. No.: 1; 1 Disk, Microsoft, Sep. 1992 

Y 

Yes 

MSDN Issue: Jan 1993; Vol. No. 2; 1 Disk, Microsoft, Jan. 1993 

Y 

Yes 

MSDN Issue: Apr. 1993; Vol. No. 3; i Disk, Microsoft, Apr. 1993 

Y 

Yes 

MSDN Issue: Summer 1993; Vol. No. 4; 1 Disk, Microsoft, Jul. 1993 

Y 

Yes 

MSDN Issue: Fall 1993; Vol. No. 5; 1 Disk, Microsoft Oct. 1993 

Y 

Yes 

MSDN Issue: Winter 1994; Vol. No. 6; 1 Disk, Microsoft, Jan. 1994 

Y 

Yes 

MSDN Issue: Apr. 1994; Vol. No. 7; 1 Disk, Microsoft, Apr. 1994 

Y 

Yes 

MSDN Issue: Jul. 1994; Vol. 8; 1 Disk, Microsoft, Jul. 1994 

Y 

Yes 

MSDN Issue: Oct 1994; Vol. 9; 1 Disk, Microsoft, Oct 1994 

Y 

Yes 

MSDN Issue: Jan 1995; Vol. 10; 1 Disk, Microsoft, Jan. 1995 

Y 

Yes 

MSDN Issue: Apr. 1995; Vol. 11; 1 Disk, Microsoft, Apr. 1995 

Y 

Yes 

MSDN Issue: Jul. 1995; Vol. 12; 1 Disk, Microsoft, Jul. 1995 

Y 

Yes 

MSDN Issue: Oct 1995; Vol. 13; 1 Disk, Microsoft, Oct. 1995 

Y 

Yes 

MSDN Issue: Jan 1996; Vol. 14; 2 Disks, Microsoft, Jan. 1996 

y 

Yes 

MSDN Issue: Apr. 1996; Vol. 15; 2 Disks, Microsoft, Apr. 1996 

Y 

Yes 

MSDN Issue: Jul. 1996; Vol. 16; 1 Disk, Microsoft, Jul. 1996 

Y 

Yes 

MSDN Issue: Oct 1996; Vol. 17; 2 Disks, Microsoft, Oct. 1996 

Y 

Yes 

MSDN Issue: Jan 1997; Vol. 18; 2 Disks, Microsoft, Jan. 1997 

Y 

Yes 

MSDN Issue: 16-Bit Archive 1997; Vol. NA; 1 Disk, Microsoft, Jan. 1997 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 1 0 


InterTrust Tech. Corp. v. Microsoft Corp, 
Case No* C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Y 

Yes 

MSDN Issue: Apr. 1997; Vol. No. 20; 2 Disks, Microsoft, Apr. 1997 

y 

Yes 

MSDN Issue- Jul 1997* Vol No 21: 2 Disks, Microsoft, Jul. 1997 

Y 

Yes 

MSDN Issue: Oct 1997; Vol. No. 24; 2 Disks, Microsoft, Oct. 1997 

Y 

Yes 

MSDN Issue: Visual Studio 1997; Vol. No. 191; 1 Disk, Microsoft, 1997 

Y 

Yes 

M^DN I<i<me' Jan 1998* Vol No 27' 2 Disks. Microsoft. Jan. 1998 

Y 

Yes 

MSDN Issue: Apr. 1998; Vol. No. 30; 2 Disks, Microsoft, Apr. 1998 

Y 

Yes 

MSDN Issue: Jul. 1998; Vol. No. 33; 3 Disks, Microsoft, Jul. 1998 

Y 

Yes 

MSDN Issue: Oct 1998; Vol. No.: None; 3 Disks, Microsoft, Oct 1998 

v 
i 

1 CO 

M^DNT T«ue- Jan 1999- Vol Nn ■ None- 3 Disks. Microsoft. Jan. 1999 

Y 

1 Co 

M^niM T«np' Anr 1999* Vol Nn ■ None* 3 Disks Microsoft Aor 1999 

Y 

Yes 

MSDN Issue: Jul. 1999; Vol. No.: None; 3 Disks, Microsoft. Jul. 1999 

Y 

Yes 

MSDN Issue* Oct 1999* Vol No * None* 3 Disks Microsoft. Oct 1999 

Y 

Yes 

Chaum. David: Smart Card 2000. Selected Papers from the Second International 

•smart Card 9000 dnrtfprenep Oct 4-6 1989 

Y 

Yes 

CD Jukebox 


X Co 

Tl S Patent Nn 4 926 480* Mav IS 1990 


Yes 

U.S. Patent No. 4,529,870; Jul. 16, 1985 


Yes 

M<*vf*r Pari H • Matva<? Steohen M * Crvotofflraohv* A New Dimension in 

PrvmnntAf ^^ntrttv Tnhn Wtlpv ^ Srvrm N^W Ynrtc 1982 


Yes 

"Interchange Message Specification for Debit and Credit Card Message Exchange 
Amnna Pinanrtal Tn«tihitinn*4" American National Standard Accredited Standards 
Committee X9-Hnancial Services Committee, ANSI X9J2-1988, American 
Bankers Association! May 16. 1988 B1 

Y 

Yes 

Excerpts from Jul. 1993 MSDN disks, Jul. 1993 

Y 

Yes 

Pert RMviamin- Tvaar J D * Sirhu Marvin* "NetBill Securitv and Transaction 
Protocol", Carnegie Mellon University 


Yes 

Cox, Brad; "What if there is a Silver Bullet and the competition gets it first?", 
Journal of Obiect-oriented Procramminc Jun. 1992 

Y 

Yes 

"CITED Final Report A Guide to CITED Documentation 4 ', ESPRIT, Project 5469, 
ISBN 0-7 123-21 15-2. The CITED Consortium, Sep. 1994 

Y 

Yes 

Boisson, Jean-Francois; rt l - Business Perspectives and Requirements, 2 - The 
CITED Project: keys and knowledge", CITED 5469 

Y 

Yes 

Van Slype, Georges; "Knowledge Economy: future trends", CITED 5469 

Y 

Yes 

Boisson, Jean-Francois; "Software components: deliverable Trial Offer", CITED 
5469 

Y 

Yes 

Van Slype, Georges; "The CITED approach, Ver, 4.0", ESPRIT II, Project 5469, 
The CITED Consortium. Apr. 20, 1994 

Y 

Yes 

Moens, Jan; "Report on the users requirements, Ver. 1.0", ESPRIT II, Project 
5469. The CITED Consortium, Nov. 27, 1991 

Y 

Yes 

Schulze, Dr. J.; "Case of application of the generic CITED Model to the 
CTTEDisation in the software distribution process", ESPRIT II, Project , Jan. 12, 
1993 

Y 

Yes 

Moens, Jan; "Case of application of the generic CITED Model to the CITEDisarion 
of a directory database on CD-ROM, Vex. 2.0", ESPRIT II, Project 5469. The 
CITED Consortium. Nov. 30, 1992 

Y 

Yes 

Pijnenborg, Mari F.J.; "CITED Fmal Report", Elsevier Science B.V., Apr. 1994 


* Any possible *Y*s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 1 1 


InterTrust Tech. Corp. v, Microsoft Corp. 
Case No* C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Y 

Yes 

Boisson, Jean-Francois; "How to CITEDise application: Guidelines and examples , 
CITED 5469 

Y 

Yes 

Nguyen, Thanh; Saint Etienne, Patricia Louise (SAGEM); "Guidelines for 
Validation of a CITED Svstem" CITED 5469 SA-2 1-40-003. Jul 4, 1994 

Y 

Yes 

Van Slype, Georges; "The future of CITED: a feasibility study, Ver. 1.1 - Vol. I: 
KurnTury "T^rt and recommendations". ESPRIT II. Project 5469. The CITED 

rVtncrtrtiiim Mar 9ft 1 QQA. 

Y 

Yes 

Van Slype, Georges; "The future of CllKD: a feasibility study, Ver. LI - Vol. HI: 
TWt PTTFT) interehangft formats*. ESPRIT II. Project 5469. The CITED 

Pnncnrtinm Mar ?R 1004 

Y 

Yes 

"CITED: Copyright in Transmitted Electronic Documents, Special Interest Group", 

PTTFD Meetinc? Heathrow Sen 22 1993 

Y 

Yes 

Miscellaneous letters from Georges Van Slype at Bureau Van Dijk, Mar. 30, 1995 

Y 

Yes 

Pijnenborg, Mari FJ.; "auteursrecht en de digitale bibliotheek", 195 Open, Jan, 37, 
iyyo 

Y 

Yes 

Miscellaneous letters from Georges Van Slype at Bureau Van Dijk, Feb. 13, 1995, 

XT—.,, O 1 QQA 

v 
i 

Van 

ies 

Van Slype, Georges; U PL4 RACE/ACCOPI Workshop on Conditional Access and 

r*r>i-w»rt^oV»» ■pj-rttrwiirxn 1 ' PQPPTT IT Pmi>**t ^AftQ The PlTKD Consortium Nov 9 

1994 

Y 

Yes 

Miscellaneous letters from G. Van Slype at Bureau Van Dijk, Sep. 12, 1994, Sep. 
1994, May 11, 1994, May 10, 1994, May 6, 1994, May 4, 1994, Apr. 21, 1994, 
Act. 20. 1994 

Y 

Yes 

Letter re: ESPRIT III - Project 5469 (CITED) from A. Stajano at Commission of 
the European Communities, Oct. 7. 1993 

Y 

Yes 

ESPRIT Project: 5469: Contract Amendment Number: 2; Q>rnmission of the 
European Communities, Sep, 16, 1993 

Y 

Yes 

Miscellaneous letters from George Van Slype at Bureau Van Dijk, Apr. 19, 1994, 
Aor. 18, 1994, Adt. 11, 1994. Apr. 6, 1994 

Y 

Yes 

•T*~ P»tnr* *f rir<*t- A F^ihility Stiidy" T ESPRIT EL Project 5469. The CITED 
Consortium Apr. 15. 1994 

Y 

Yes 

Miscellaneous letters from Bureau Van Dijk, Mar. 30, 1994, Mar. 24, 1994, Feb. 
10, 1994. Feb. 10. 1994 

Y 

Yes 

Handwritten note re: GVS and AJL, Mar. 2, 1994 

Y 

Yes 

Miscellaneous letters from Bureau Van Dijk, Feb. 9, 1994, Jan. 27, 1994, Jan. 19, 
1994, Jan. 12, 1994, Dec. 22, 1993, Nov. 30, 1993, Nov. 22, 1993, Dec. 6. 1993, 
Nov. 16, 1993, Oct. 15, 1993, Oct. 7, 1993, Oct 4, 1993, Sep. 20, 1993, Sep. 7, 
1993. Mav 19. 1993. Oct. 13. 1993 

Y 

Yes 

Bureau Van Dijk Management Report for Task 4.5: Feasibility Study of the Cited 
Agency, 1992-1993 

Y 

Yes 

Bureau van Dijk: Gestion des contrats; 497C C.C.E. : CITED (SUITE), Feb. 1993 

Y 

Yes 

"CITED: Preparation of the CITED model functional requirements specifications - 
Discussion paper (revision 1)", Bureau Van Dijk, Jan. 16, 1991 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 1 2 


InterTrust Tech. Corp. v, Microsoft Corp. 
Case No. C 014640 SEA (MEJ) 


APPENDIX OF PRIOR ART* 





Y 

Yes 

"CITED: Preparation of the CITED Model Functional Requirements Specifications 
- Report of the interview with OXFORD UNIVERSITE PRESS, CITED part", 
Bureau Van Diik, Feb, 27. 1991 

Y 

Yes 

"CITED: Preparation of the CITED Model Functional Requirements Specifications 
- Reports of the interviews with five CITED Partners" (Partners: Sagem, 
Telesystemes, NTE, Elsevier, Oxford University Press), Bureau Van Dijk, Apr. 5, 
1991 

Y 

Yes 

"CITED: Preparation of the CITED Model Functional Requirements Specifications 
- Reports of the interviews with Seven International Organizations: EBU, ECM A, 
ELDA, EFPI, EFTC. STM. WEPO", Bureau Van Dijk, May 27, 1991 

Y 

Yes 

Van Slype, Georges; Moens, Jan; Vannieuwenhuyse, Lawrence; "The future of 
CITED: a feasibility study". ESPRIT IT. Project 5469. The CITED Consortium, 
Nov. 15. 1993 

Y 

Yes 

Van Slype, Georges; "Draft CITED interchange formats, Ver. 1 .0", ESPRIT II, 
Project 5469. The CITED Consortium. Jan. 28, 1994 

Y 

Yes 

Miscellaneous letter from Georges Van Slype at Bureau Van Dijk, Feb. 28, 1994 

Y 

Yes 

Van Slype, Georges; 'The future of CITED : a feasibility study, Ver. 1.0 - Vol. I: 
Summary report and recommendations". ESPRIT II. Project 5469. The CITED 
Consortium* Feb. 28, 1994 

Y 

Yes 

Van Slype, Georges; Moens, Jan; Vannieuwenhuyse, Laurence; 'The future of 
CITED: a feasibility study, Ver. 1.0 - Vol. II: Full report", ESPRIT II, Project 
5469. The CITED Consortium. Feb. 28, 1994 

Y 

Yes 

Van Slype, Georges 'The future of CITED: a feasibility study, Ver. 1.1- Vol. ID: 
Draft CITED interchange formats". ESPRIT II. Proiect 5469. The CITED 
Consortium, Feb. 28, 1994 • 

Y 

Yes 

"The Future of Cited: A Feasibility Study", ESPRIT II, Project 5469, CITED 
Proiect Review, Apr. 15, 1994 

Y 

Yes 

Van Slype, Georges; U PL4 RACE/ACCOPI Workshop on Conditional Access and 
Copyright Protection", ESPRIT II, Project 5469, Presentation of the CITED, Nov. 
9. 1994 

Y 

Yes 

Van Slype, Georges; "Natural Language version of the generic CITED model, Ver, 
4.2 - Vol. I: Presentation of the generic model", ESPRIT II, Project 5469, The 
CITED Consortium. Mav 8. 1995 

Y 

Yes 

Van Slype, Georges; ''Natural language version of the generic CITED model, Ver. 
2.1 - Vol. II ECMS (Electronic Copyright Management System) design for 
computer based applications". ESPRIT II. Project 5469. The CITED Consortium. 
Mav 8. 1995 


Yes 

Cousins, Steve B.; Ketchpel, Steven P.; Paepcke, Andreas; Garcia-Molina, Hector; 
Hassan, Scott W.; Roscheisen, Martin; 'TnterPay: Managing Multiple Payment 
Mechanisms in Digital Libraries" 


Yes 

"PKCS #5: Password-Based Encryption Standard", An RSA Laboratories 
Technical Note, Ver. 1.5, 1991-1993, Revised Nov. 1, 1993 


Yes 

"PKCS #8: Private-Key Information Syntax Standard", An RSA Laboratories 
Technical Note. Ver. 1.2. 1991-1993. Revised Nov. 1. 1993 


Yes 

"PKCS #10: Certification Request Syntax Standard", An RSA Laboratories 
Technical Note. Ver. L0,Nov. 1. 1993 


* Any possible M Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 1 3 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Yes 

"PKCS #11: Cryptographic Token Interface Standard", An RSA Laboratories 
Technical Note, Ver. 2.0, Apr. 15, 1997 


Vac 

i es 

"PKCS 12 vl.O: Personal Information Exchange Syntax", RSA Laboratories, Jun. 
24, 1999 


Yes 

*TKCS #13: Elliptic Curve Cryptography Standard", RSA Security, Jan. 12, 1998 


Yes 

"PKCS #15 vl .0: Cryptographic Token Information Format Standard", RSA 
Laboratories. Apr. 23. 1999 


Yes 

U.S. 5,335,346; Aug, 2, 1994 

y 

Yes 

ttarfinWftl, Sirmnn- Sp*ffnrri_ Gene: Practical UNIX Securitv, O'Reillv & 
Associates, Inc., 1991 

Y 

Yes 

Merkle, Ralph G, "Protocols for Public Key Cryptosysterns", IEEE, 1980 


Yes 

K-aiw rvm; Falk, Tar.V; Npiyftn. Hung Ouoc: Testine Computer Software. Second 
Edition, Van Nostrand Reinhold, 1988 


Yes 

Press, Jim; Bunting, Angela "A New Approach to Cryptographic Facility Design", 
ICL Mid-Range Systems Division Reading, Berks, UK 

Y 


US 6,256,668; Jul. 3, 2001 

Y 


Kim, Gene H.; Spafford, Eugene H.; "Experiences with Tripwire: Using Integrity 
Checkers for Intrusion Detection", Purdue Technical Report CSD-TR-94-012, Feb. 
21, 1994 

Y 


"Technical Description: Pay-Per-View Copy Protection", Macrovision, Jun. 1994 

Y 


Reali, Patti; "Copy Protection: The answer to pay per view's prayers?", TVRO 
Dealer, Dec. 1994 



Swedlow, Tracy; "2000: Interactive Enhanced Television: A Historical and Critical 
Perspective", Interactive TV Today 



Various articles from EE Times, Week of Oct. 2, 1995 



"Digital Broadband Delivery System, Phase 1.0, System Overview", Revision 1.0, 
Scientific Atlanta, 1997 



Langelaar, G.C "Overview of protection methods in existing TV and storage 
devices". SMS-TUD-609-1, Final Ver. L2, Feb. 26, 1996 

Y 


Solomon, A.; "PC Viruses: Detection, Analysis, and Cure", Springer Verlag 1991. 

Y 


Galaxy, Opcode Systems, 1991-1994 

Y 


Unix System V & BSD & GNU versions prior to Feb 22, 1996 

Y 


US 5,673,316; Sep. 30, 1997 

Y 


17 USCA sections 1001-1010, Chapter 10 Digital Audio Recording Devices and 
Media, 1996 



Hill, Will; Hollan, Jim; "History-Enriched Digital Objects", Computer Graphics 
and Interactive Media Research Group; Bell Communications Research, 1993 



Hill, William; Hollan, James D.; "Edit Wear and Read Wear", Computer Graphics 
and Interactive Media Research Group, ACM; May 3-7, 1 992 


* Any possible "Y's that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 1 4 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

InterTrust Solutions for A2b, InterTrust; 

Competitive Analysis AT&T/a2b music, Jun. 16, 1998; 

Email from Chris Drost-Hansen re press release: "AT&T Launches A2B Music 
Trial for Delivering Sones Over the Internet". Business Wire. Nov. 3, 1997; 

A2b's Recent Press Coverage, 1998 


Yes 

ISO 1 1568-1 & -2: "Key management (retail) - Part 1: Introduction to key 
management"; and "- Part 2: Key management techniques for symmetric ciphers", 
ISO, Dec. 1, 1994 


Yes 

ISO 13491-1: "Secure cryptographic devices (retail) - Part 1: Concepts, 
requirements and evaluation methods", ISO, Jun. 15, 1998 


Yes 

ISO 8583-2: "Financial transaction card originated messages - Interchange message 
specifications - Part 2: Application and registration procedures for Institution 
Identification Codes (HQ", ISO, Jul. 1, 1998 


Yes 

ISO 8583-3: "Financial transaction card originated messages - Interchange message 
specifications - Part 3: Maintenance procedures for codes", ISO, Jul. 1, 1998 


Yes 

ISO 9564-1 & -2: "Personal Identification Number (PIN) management and security 
- Part 1 : Basic principals and requirements for online PIN handling in ATM and 

PO^ Rv^t^mQ* At -0 ArmrnvfcH AlonrithmfO for PIN encinherment" ISO Aor- 15. 
2002 & Dec. 15, J9? J 


Yes 

ISO 9807; "Banking and related financial services - Requirements for message 
authentication (retail) " ISO, Dec. 15, 1991 


Yes 

Secure Electronic Transactions; Mastercard and Visa+C345 


Yes 

Tanenbaum, Andrew S; van Renesse, Robbert; van Staveren, Hans; Sharp, Gregory 
J.; Mullender, Sape J.; Jansen, Jack; van Rossum, Guido; "Experiences with the 
Amoeba Distributed Operating System* 1 , Vrije Universiteit and Centrum voor 
Wiskunde en Informatica 


Yes 

Tanenbaum, Andrew S; Mullender, Sape J.; van Renesse, Robbert; "Using Sparse 
Capabilities in a Distributed Operating System", Vrije Universiteit and Centre for 
Mathematics and Computer Science 

y 

Yes 

Tanenbaum, Andrew S; van Renesse, Robbert; van Staveren, Hans; Sharp, Gregory 
J.; Mullender, Sape J.; Jansen, Jack; van Rossum, Guido; "Amoeba System", 
Communications of the ACM, Vol. 33, No. 12, Dec. 1990 


Yes 

"KeyKOS Principles of Operation", Key Logic document KL002-04, 1985, (Fourth 
Edition, Jan. 1987) 


Yes 

Landau, Charles R.; "Security in a Secure Capability-Based System", Operating 
Systems Review, Oct, 1989 


Yes 

"Security in KeyKOS" 


Yes 

Hardy, Norman; "The Keykos Architecture", Key Logic Document KLG28-08, 
Eighth Edition, Dec. 1990 


Yes 

Johnson, Howard L,; Koegel, John R; Kocgel, Rhonda M; "A Secure Distributed 
Capability Based System", ACM, 1985 


* Any possible T's that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 15 


InterTnist Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SEA (MEJ) 


APPENDIX OF PRIOR ART* 




Yes 

Kim, Gene H.; Spafford, Eugene H.; "Experiences with Tripwire: Using Integrity 
Checkers for Intrusion Detection", COAST Laboratory, Purdue University, Feb. 
22, 1995 


Yes 

Blaze, Matt; "Key Management in an Encrypting File System", Proc. Summer 1994 
USENIX Technical Conference, Jun. 1994 


Yes 

Robinson, D.; Ullmann, R.; "Encoding Header Field for Internet Messages", 
Network Working Group RFC 1 154, Apr. 1990; 

Rose, M.; McCloghrie, K.; "Structure and Identification of Management 
Information for TCP/IP-based Internets", Network Working Group RFC 1 155, 
May 1990 


I CS 

Rose, M.; McCloghrie, K.; "Structure and Identification of Management 
Information for TCP/IP-based Internets", Network Working Group RFC 1 155, 
May 1990; 

McCloghrie, K.; Rose, M.; "Management Information Base for Network 
Management of TCP/IP-based internets , Network Working Group RFC 1156, 
May 1990; 

Case, J.; Fedor, M.; Schoffstall, M.; Davin, J.; "A Simple Network Management 
Protocol (SNMP)", Network Working Group RFC 1 157, May 1990 


Yes 

ftevirt T * f"Tfl1vin 1 • AArPlrttrhrif* K" * "^MA/TP AHmmictTfltive Modfcl" Network 

Working Group RFC 1351, Jul., 1992; 

Galvin, J.; McCloghrie, K.; Davin, J.; "SNMP Security Protocols", Network 
Working Group RFC 1352, Jul, 1992; 

McCloghrie, K.; Davin, J.; Galvin, J.; "Definitions of Managed Objects for 

A Jmi'vti^ahftft /vFCMVTD D^T+Jttp" lMtfittintrV U/nrVirifr fir/Mir* I?"RP 1 fill 1007 

Administration 01 oiNMir x arties , xsetworK vvoncmg uroup kjh^ i od jui., 


Yes 

"PKCS #1 : RSA Encryption Standard", RS A Laboratories Technical Note, Ver. 
1.5, Revised Nov. 1, 1993 


Yes 

"PKCS #3: Diffie-Hellman Key-Agreement Standard", RSA Laboratories 
Technical Note, Ver. 1.4, Revised Nov. 1, 1993 


Yes 

"PKCS #6: Extended-Certificate Syntax Standard", RSA Laboratories Technical 
Note, Ver. 1.5, Revised Nov. 1. 1993 


Yes 

"PKCS #9: Selected Attribute Types", RSA Laboratories Technical Note, Ver. 1.1, 
Revised Nov. 1, 1993 


Yes 

Shneier, B.; "Description of new variable-length key, 64-bit block cipher 
(Blowfish)", Fast Software Encryption, Cambridge Security Workshop 
Proceedings, 1994 


Yes 

Feistel, H.; "Cryptographic Coding for Data-Bank Privacy", IBM document RC 
2827, Mar. 18, 1970 


Yes 

ACORN/ CLEAR, 1996-1998 


Yes 

Tuck, Bill; "Electronic Copyright Management Systems: Final Report of a Scoping 
Study for eLib", Jul., 1996 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 16 


Intel-Trust Tech. Corp. v. Microsoft Corp* 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 


r7: q 



Y 

Yes 

,, r^r\rK\tQm<t-r^ ff~*S}\fi\ en it" T?itrr*T\(»Tn Information TVrHimlnov for Tnformfltion 

Science; 

COPYSMART - 20517: "CITED based multi-media IPR management on cost 
effective smart device", European Information Technology for Information 
Science, start date Dec. l t 1995; 

Summaries of Projects (FP in/IV) - Part I: "ESPIRIT Project 205 17 - 
COPYSMART CITED based multi-media IPR management on cost effective smart 
device", European Information Technology for Information Science, Oct. 1998 


Yes 

"CREANET - Creative Rights European Agency NETwork - Project Profile" 
information society technologies, edited Feb. 18, 2000 


Yes 

"iOpener System Description" , National Semiconductor, 1993 


Yes 

"iPower Technology" (National Semiconductor marketing brochure) 


Yes 

"the Standards Business: Time for Change," European Commission DG1 1 1 
Espirit Project 5th Consensus Forum, Nov. 3-4, 1998; 

"ESPIRIT Project 20676 - IMPRIMATUR - Intellectual Multimedia Property 

"DJrfV>tr tk-nA TWrmnrtlrtftv frvr T Tnivprcal "R^fprfnr/** 1 IMPRIMATUR 

Jtvignis jviouei ano i ciimiioiugy tor universal xvcicreiivc , ±ivix jvuYirvi 
Consortium, Oct. 1998; 

Electronic Reserve Copyright Management system (niccuM^;, international 
Institute for Electronic Library Research, website updated by Ramsden, Arme, Jul. 
22, 1996; 

Achievements Archive, www4mprimatur.net/ web pages; 
impramatur news, iMPRIMATUR, Dec. 1998; 


Yes 

JUKEBOX-Music Across Borders, LIB -JUKEBOX/4- 1049 


Yes 

"ESPRIT Project 24378 - MENHIR European Multimedia network of high quality 
image registration", Museums On Line, Feb. 1, 1997 


Yes 

"ESPIRIT Project 22226 - MUSE - Developing standardized digital media 
management, signaling and encryption systems for the European music sector", 
International Federation of the Phonoeraohic Industry. Oct. 1998 


Yes 

"STARFISH State of the Art Dinancial Services for the inHabitants of isolated 
areas - Project Profile" information society technologies, time schedule Jan. 21, 
2000 -Jun. 30, 2002 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 17 


InterTnist Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 




VJ;:V-i;..:i : ; : v/<- ' i 


Yes 

"TALISMAN - Tracing Authors' rights by Labelling Image Services and 
Monitoring Access Network,* 4 ACTS Project No. AC019, Doc Reference AC019- 
THO-RGS-FR-P-001-bi. Sep. 25, 1998; 

Simon, C; Goray, E.; Vercken, G.; Delivet, B.; Delaigle, JF.; Boucqueau, JM.; 
"Digital Images protection managment in a broadcast framework: 
Overview/TALISMAN solution," Thomson-CSF, RTBF, ART3000, UCL; 

"TALISMAN: Tracing Authors* rights by labelling image services and monitoring 
access network," ACTS, Swiss Participation in European Research Programmes, 

s™ i iqq^AiiB iwft 


Yes 

"TELENET TELEtraining platform (on NET works) - Project Profile" information 
society technologies, time schedule Mar. 6, 2000 - Mar. 30, 2000; 

"Deliverable D3: Specification of the Infrastructure And explanation of trust and 
confidence building solutions" Ver. 0.1, Telenet, Jul. 18, 2000; 

Email from Ed moral Kouka to Jean-Francois Boisson re Affaire BC-CreaNet; Feb. 
10, 2001; 

Email from Bogdan Lutkiewicz to Jean-Francois Boisson re TELENET 
TELEtraining platform - Bogdan Lutkiewicz, Poland, Gdansk; Mar. 4, 2001 

Y 

Yes 

Boisson, Jean-Francois; "Management of Intellectual Property Rights in the 
Electronic Commerce: Textile Design Sales And Other Similar Initiatives," 
EURITIS 


Yes 

U.S. Patent No. 5,251,294; Oct. 5, 1993 


Yes 

S.H. Low, N.R Maxemchuk, J.T. Bassil, & L. O'Gorman, Document Marking and 
Identification Using Both Line and Word Shifting, Infocom 95, 1994 


Yes 

Caroni, Maxemchuck & O'Gorman, Electronic Marking and Identification 
Techniques to Discourage Document Copying, Proc. Infocom 94, 1994 


Yes 

Wagner, Fingerprinting, IEEE Symp. On Info, and Privacy, Apr., 93 


Yes 

TJ DibtctKciI T nnnrman n 1^mt«v*t4ncy Oum^rvfiin T7 1 nhfo THrnil oH T^IOltfll 

rx. JDergnai, vjgoiiiiari, rTuiecung u wncrsnip xugnis i niuugii jLugiuu 
Watermarking**, IEEE Computing v. 29, No.7, Jul.. 1996, 


Yes 

Chor, Fiat & Naor, Tracing Traitors, Crypto 94, p. 257, 1994 


Yes 

David Chaum, "Security Without Identification: Transaction Systems to Make Big 
Brother Obsolete", Comm. Of the ACM, vol. 28, no. 10, Oct. 1985 


Yes 

"Wallet Databases with Observers", David Chaum. Advances m Crvptoioev - 
Proceedings of Crypto *92 (pp. 89-105). 1992 

Y 

Yes 

Sirbu, Marvin; Tygar, J.D.; "NetBOl: An Internet Commerce System Optimized for 
Network Delivered Services", Carnegie Mellon University 


Yes 

Ulrich Kohl, Jeffrey Lotspiech, Marc Kaplan, "Safeguarding Digital Library 
Contents and Users", IBM Research Division, D-Lib Magazine, Sept. 97 


Yes 

Daniel Schutzer, A Need for a Common Infrastructure: Digital Libraries and 
Electronic Commerce, Apr. 1996 


Yes 

Michael Lesk, Digital Libraries Meet Electronic Commemce: On-Screen 
Intellectual Property, Dec. 15, 98 


* Any possible u Y u s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart In Appendix B. 18 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 


■■■ 



Yes 

Lorcan Dempsey & Stuart L. Weibel; The Warwick Metadata Workshop: A 
Framework for the Deployment of Resource Description, JulV Aug. 96 


Yes 

"AT&T Smart Cards Systems & Solutions", AT&T, 1993 

Y 

Yes 

oempius, vnx^Jo* jviuiii /\ppucauon i*mp isperauiig oystem * introaucuon , 
Gemplus Card International, 1990 


Yes 

vruiiiou, uouis oman v-oios ana vA>naiuonai /\ccoss , opnngcr- venag, xyoo 


Yes 

David L. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital 
i'seudonyms , lyoi 


Yes 

Kent, S,; "U.S. Department of Defense Security Options for the Internet Protocol", 
tNeiworK w or Kin 2 vjroup Jtvrv_> i iuo, inov. iyyi 


Yes 

Deering, S.E.; "Host Extensions for IP Multicasting", Network Working Group, 
RFC 1112 Aue 1989 


Yes 

Pethia, R.; Crocker, S.; Fraser, B.; "Guidelines for the Secure Operation of the 
Internet" Network Working Grouo RFC 1281 Nov 1991 


Yes 

Galvin, J.; McCloghrie, K.; "Security Protocols for version 2 of the Simple 
Network Management Protocol CSNMPv2T Network Workine Grouo RFC 1446. 
Aor., 1993 


Yes 

Eastlake III, D.; "Physical Link Security Type of Service", Network Working 
Grouo RFC 1455 Mav 1993 


Yes 

Kastenholz, F.; "The Definitions of Managed Objects for the Security Protocols of 
the Point-to-Point Protocol", Network Working Group RFC 1472, Jun. 1993 

Y 

Yes 

Kohl, J., Neuman, C; "The Kerberos Network Authentication Service (V5)", 
Network Working Group RFC 1510, Sep., 1993 


Yes 

Eastlake HI, D.; Crocker, S.; Schiller, J.; "Randomness Recommendations for 
Security", Network Working Group RFC 1750, Dec. 1994 


Yes 

"HaIIpt N • "Th^ R/JTFY OnR-Time Pa«wnrH <ivttfm H Network Working Grftun 

RFC 1760, Feb,, 1995 


Yes 

Atkinson. R * "Security Architecture for the Internet Protocol". Network Workine 
Group RFC 1 825, Au*., 1995 


Yes 

Crocker, S.; Freed, N.; Galvin, J.; Murphy, S.; "MIME Object Security Services", 
Network Working Group RFC 1848, Oct, 1995 


Yes 

U.S. Patent No. 5,251,294; Oct. 5, 1993 


Yes 

S.H. Low, N.F. Maxemchuk, J.T. Bassil, & L. O'Gorman, "Document Marking and 
Identification Using Both Line and Word Shifting,' 1 AT&T Bell Laboratories, 
Infocom95. Jul. 29. 1994 


Yes 

Brassil, I.; Low, S.; Maxemchuck, N.; O'Gorman L.; "Electronic Marking and 
Identification Techniques to Discourage Document Copying," AT&T Bell 
Laboratories, Proc. Infocom94, 1994 


Yes 

Wagner, Neal; "Fingerprinting," Drexel University, IEEE Symp. On Info, and 
Privacy, Apr., 1993 


Yes 

Berghal, Hal; Ogorman, Lawrence; "Protecting Ownership Rights Through Digital 
Watermarking" IEEE Computing v. 29, no.7, pp. 101-103, Jul., 1996 


Yes 

Chor, Benny; Fiat, Amos; Naor, Moni; "Tracing Traitors," Crypto 94, p. 257, 1994 


* Any possible p Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 19 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Yes 

Chaum, David; "Security Without Identification: Transaction Systems to Make Big 
Brother Obsolete", Communications of the ACM, vol. 28, no. 10, Oct, 1985 


Yes 

Chaum, David; Pederson, Torben Pryds; "Wallet Databases with Observers", CWI, 
Aarhus University. David Chaum, Advances in Crvptology - Proceedings of 
Crypto '92, pp. 89-105, 1992 


Yes 

Kohl, Ulrich; Lotspiech, Jeffrey; Kaplan, Marc; "Safeguarding Digital Library 
Contents and Users". IBM Research Division, D-Lib Magazine, Sept., 1997 


Yes 

Schutzer, Daniel; "A Need for a Common Infrastructure: Digital Libraries and 
Electronic Commerce/ Citibank, D-Lib Magazine, Apr., 1996 


Yes 

Pn*mf*V*» AnHrpji*:* "Snmmarv nf Xtanfrtrri , <: Digital Librarv Testbed and Status" 

Stanford University, D-Lib Magazine, Jul.- Aug., 1996 


I Co 

Dempsey, Lorcan; Weibel, Stuart L.; "The Warwick Metadata Workshop: A 
Pram pwrwk finr th*» D^nlovmpnt of Resource DescriDtion" University of Bath. 
OCLC Office of Research, D-Lib Magazine, Jul.-Aug., 1996 


Yes 

"AT&T Smart Cards Systems & Solutions", AT&T, 1993 


Yes 

Brad J. Cox, Dr., "What if there is a silver bullet?", Dobbs Journal, Oct. 1992 


Yes 

Guillou, Louis C; "Smart Cards and Conditional Access", Springer-Veriag, 1988 


Yes 

Chaum, David; "Untraceable Electronic Mail, Return Addresses, and Digital 
Pseudonyms", Communications of the ACM, vol. 24, No. 3, Feb., 1981 


Yes 

Kent, S.; "U.S. Department of Defense Security Options for the Internet Protocol", 
Network Working Group RFC 1 108. Nov. 1991 


Yes 

Deering, S.; "Host Extensions for EP Multicasting", Network Working Group RFC 
1112, Aug. 1989 


Yes 

White, Steve R.; Comerford, Liam; "ABYSS: A Trusted Architecture for Software 
Protection", IEEE, Apr. 27, 1987 


Yes 

Ross, Philip E.; "Cops versus robbers in cyberspace"; Forbes, Sep. 9, 1996 


Yes 

*T)ata Networks and Open System Communications, Directory: Information 
Technology - Open Systems Interconnection - The Directory: Overview of 
Concepts, Models, and Services", ITU-T Recommendation X.500, International 
Telecommunication Union, Nov. 1993 


Yes 

Bender, W.; Gruhl, D.; Morimoto, N.; Lu, A.; 'Techniques for data hiding", IBM 
Systems Journal, Vol. 35, Nos. 3&4, 1996 


Yes 

Maxemchuk, N.R; "Electronic Document Distribution", AT&T Bell Laboratories 


Yes 

Doster, Bill; Rees, Jim; *Third-Party Authentication in the Institutional File 
System", Center for Information Technology Integration 


Yes 

Levy, Steven; "E-Money (That's What I Want)", Wired Magazine, Issue 2.12, Dec. 
94 


Yes 

Arms, William Y., "Key Concepts in the Architecture of the Digital Library", D- 
Lib Magazine, Jul. 1995 


Yes 

Weingart, S.R, "Physical Security for the uABYSS System" T IEEE. 1987 


Yes 

B. Strohm, L. Comerford, S. R. White, "ABYSS: Tokens", IBM Research Report 
Number RC 12402, Dec. 18, 1986 


* Any possible "Vs that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 20 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 



APPENDIX OF PRIOR ART* 



xes 

(jrozaiu, ooai; vjray» Mary, jvesnav, orinivasan, iviaaisciii, rvnjay, rviunson, tunan, 
Rosenblum, Mendel; Schoettler, Steve; Sullivan, Mark; Terry, Douglas; GAFFES: 
The Design of a Globally Distributed File System , Report No. UCB/CSD 87/361; 
Computer Science Division (EECS), U.C. Berkley, Jua 1997 


Yes 

Chaum, David; Fiat, Amos; Naor, Mom; Untraceable Electronic Cash , Lecture 
Notes in Computer Science, 403, Advances in Cryptology - CRYPTO '88 
Proceedings, 1988 


Yes 

Chaum, David; "Privacy and Social Protection in Electronic Payment Systems", 
Chapter 12. The Future of Monev in the Information Age 


ies 

Bos, Jurjen-; Chaum, David; "SmartCash: a Practical Electronic Payment System", 
Center for Mathematics and Computer Science, Report CS-R9035, Aug. 


Yes 

Gircvs. Gintaras R.; Understanding and Using COFF. OReilly & Associates, Inc.; 
Nov. 1988 


Yes 

Unix Svstem V. Release 3.2, Programmers Guide Vol. II. AT&T. Prentice Hall. 

1989 


Yes 

Richarson. Dennis W.; Electric Monev; Evolution of an Electronic Funds-Transfer 



Yes 

Custer, Helen: Inside Windows NT, Microsoft Press, Redmond, WA, 1993 


Yes 

Pietrek. Matt; Windows Internals: The Implementation of the Windows Operating 

cnvixonjiicnt, /\uuison-irvesiey, 


Yes 

Gilde, R., "DAT-Heads; Frequendy Asked Questions", 1991, Release 3.1-Sep. 2, 
1992 


Yes 

Tardo, Joseph; Valente, Luis; "Mobile Agent Security and Telescript*, General 
Magic, Inc. 


Yes 

"Telescript Security", BYTE.com, Oct. 1994 


Yes 

"Forum on Risks to the Public in Computers and Related Systems: ACM 
Committee on Computers and Public Policy, Peter G. Neumann, moderator", Risks- 

ruruni lyiKesi, vol. zj, issue *h/, Jan. 


Yes 

Sahuguet, Arnaud; "Piracy; the Dark Side of Electronic Commerce: CIS-70CV2", 
Univ. of Pennsylvania, May 5, 1998 

Y 

Yes 

Rouaix, Francois; "A Web navigator with applets in Caml", INRIA 


Yes 

Fuchsberger, Andreas; Gollmann, Dieter; Lothian, Paul; Paterson, Kenneth G.; 
Sidiropoulos, Abraham; "Public-key Cryptography on Smart Cards", Information 
Security Group 


Yes 

"An Introduction to Safety and Security in Telescript", Telescript Powered 


Yes 

Clarke, Roger; Bunting, Angela; "Cryptography issues in plain text", Privacy Law 
and Policy Reporter, 1996 

Y 

Yes 

Pratt & Witney Inuse 

Y 

Yes 

Use of ATM 

Y 

Yes 

Use of Set Top Box 

Y 

Yes 

Protective Envelope System 









PRIOR ART 


Yes 

3,573,747; Adams et at. 


* Any possible Ts that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 21 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Yes 

3,609.697; Blevins 


Yes 

3,790,700; Callais et al. 


Yes 

3,796.830; Smith 


Yes 

3 ,798,359; Feistel 


Yes 

3,798.360; Feistel 


Yes 

3,798,605; Feistel 


Yes 

3,806,882; Clarke 


Yes 

3,829,833; Freeny, Jr. 


Yes 

3,906,448; Henriques 


Yes 

3,911.397; Freeny, Jr. 


Yes 

3,924,065; Freeny, Jr. 


Yes 

3,931,504; Jacoby 


Yes 

3,946,200; Brobeck et al. 


Yes 

3,946,220; Brobeck et al. 


Yes 

3,956,615; Anderson et al. 


Yes 

3,958,081; Ehrsam et al. 


Yes 

3,970,992; Boothroyd et al. 


Yes 

4,048,619; Forman, Jr. et al. 


Yes 

4,071,911; Mazur 


Yes 

4,112,421; Freeny, Jr. 


Yes 

4,120,030; Johnstone 


Yes 

4,162,483; Entenman 


Yes 

4,163,280; Mori etal. 


Yes 

4,168,396; Best 


Yes 

4,196,310; Forraan et al. 


Yes 

4,200,913; Kuhai et al 


Yes 

4,209,787; Freeny, Jr. 


Yes 

4,217,588; Freeny, Jr. 


Yes 

4,220,991; Hamano et al. 


Yes 

4,232,193; Gerard 


Yes 

4,232,317; Freeny, Jr. 


Yes 

4,236,217; Kennedy 


Yes 

4,253,157; Kirschner et al. 


Yes 

4.262.329; Bright etal. 


Yes 

4^65,371; Desaietal. 


Yes 

4,270,182; Asiia 


Yes 

4,278.837; Best 


Yes 

4,305,131; Best 


Yes 

4,306,289; Lumley 


Yes 

4,309,569; Merkle 


Yes 

4,319,079; Best 


Yes 

4,323,921; Guillou 


Yes 

4,328,544; Baldwin et al. 


Yes 

4,337,483; Guillou 


Yes 

4,361,877; Dyer etal. 


Yes 

4,375,579; Davida etal. 


Yes 

4,433,207; Best 


Yes 

4,434,464; Suzuki et al. 


* Any possible u Y tt s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 22 


InterTrust Tech* Corp. v. Microsoft Corp. 
Case No* C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 




; '>';•■ '-:] 



Yes 

4,442,486; 

Mayer 


Yes 

4,446,519' 

Thomas 


Yes 

4,454,594; 

Heffron et al. 


Yes 

4,458,315; 

Uchenick 


Yes 

4,462,076; 

Smith, III 


Yes 

4,462,078; 

Ross 


Yes 

4,465,901; 

Best 


Yes 

4,471,163; 

Donald et al. 


Yes 

4,484,217* 

Block et al. 


Yes 

4,494,156* 

Kadison et al. 


Yes 

4,513,174 

Herman 


Yes 

4,528,588 

Lofberg 


Yes 

4.528 643 

Freeny, Jr. 


Yes 

4,553,252 

Hgendorf 


Yes 

4,558,176 

Arnold et al. 


Yes 

4,558,413 

Schmidt et al. 


Yes 

4,562,306 

Chou et al. 


Yes 

4,562,495 

Bond et al. 


Yes 

4,577,289 

Comerford et al. 


Yes 

4,584,641 

Guglielmino 


Yes 

4,588,991 

Atalla 


Yes 

4389,064 

Chiba et al. 


Yes 

4,593,183 

Fukatsu 


Yes 

4 593 353 

Pickholtz 


Yes 

4,593,376 

Volk 


Yes 

4,595,950 

Lofbere 


Yes 

4497,058 

Izumi et al. 


Yes 

4,622,222 

Johnson 


Yes 

4,634,807 

Chorley et al. 


Yes 

4,644,493 

Chandra et al. 


Yes 

4,646,234 

Tolman et al. 


Yes 

4,652,990 

f Pailen et al. 


Yes 

4,658,093 

Hellman 


Yes 

4,670,857 

Rackman 


Yes 

4,672^72 

Alsberg 


Yes 

4,677,434 

Fascenda 


Yes 

4,677,552 

Sibley, Jr. 


Yes 

4,680,731 

, Izumi et al. 


Yes 

4,683453 

, Mollier 


Yes 

4,685,056 

, Barasdale et al. 


Yes 

4,688,169 

Joshi 


Yes 

4,691,350 

Kleijne et al. 


Yes 

4,696,034 

, Wiedemer 


Yes 

4,700,296 

Palmer, Jr. etal. 


Yes 

4,701,846 

IkedaetaL 


Yes 

4,712238 

Gilhousen et al 


Yes 

4,713.753 

Boebert et al. 


Yes 

4,727450 

Chan** et al. 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 23 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

4,740,890; WiUiam 


Yes 

4,747,139; Taaffe 


Yes 

4,757,533; Allen et al. 


Yes 

4,757,534; Matyas et ah 


Yes 

4,768,087; Taub et al. 


Yes 

4,791,565; Dunham et al. 


Yes 

4,796,181; Wiedemer 


Yes 

4,798,209; Klingenbeck et al. 


Yes 

4,799,156; Shavit et al. 


Yes 

4,807,288; Ugonet aL 


Yes 

4,817,140; Chandra et al. 


Yes 

4,823,264; Deming 


Yes 

4,827,508; Shear 


Yes 

4,858.121; Barber et al. 


Yes 

4,864,494; Kobus 


Yes 

4,866,769; Karp 


Yes 

4,868,877; Fischer 


Yes 

4,903,296; Chandra et al. 


Yes 

4,924,378; Hershey et al. 


Yes 

4,930,073; Cina,Jr, 


Yes 

4,949,187; Cohen 


Yes 

4,975,647; Downer et al. 


Yes 

4,977,594; Shear 


Yes 

4,999,806; Chernow et al. 


Yes 

5,001,752; Fischer 


Yes 

5,005,122; Griffin etal. 


Yes 

5,005,200; Fischer 


Yes 

5,010,571; Katznelson 


Yes 

5,023,907; Johnson et al. 


Yes 

5,047,928; Wiedemer 


Yes 

5,048,085; Abraham et al. 


Yes 

5,050,213; Shear 


Yes 

5,091,966; Bloomberg et al. 


Yes 

5,103,392; Mori 


Yes 

5,103,476; Waiteetal. 


Yes 

5,111,390; Ketcham 


Yes 

5,1 19,493; Janis etal. 


Yes 

5,126,936; Champion et al. 


Yes 

5,128^525- Stearns etal. 


Yes 

5,136,643; Fischer 


Yes 

5,136,646; Haber etal. 


Yes 

5,136,647; Haber etal. 


Yes 

5,136,716; Harvey etal. 


Yes 

5,146,575; Nolan, Jr. 


Yes 

5,148,481; Abraham et al. 


Yes 

5,155,680; Wiedemer 

y 

Yes 

5,163,091; Graziano et al. 


Yes 

5.168,147; Bloomberg 


* Any possible "Y H s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 24 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 014640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 



i mk$m&- 



Yes 

5.185,717; Mori 


Yes 

5,187,787; Skeenet al. 


Yes 

5,201,046; Goldberg ct al. 


Yes 

5,201,047; MakietaJ. 


Yes 

5,208,748; Flores et al. 


Yes 

5,214,702; Fischer 


Yes 

5,216,603; Flores et al. 


Yes 

5,221,833; Hecht 


Yes 

5.222,134; Waiteetal. 


Yes 

5,224,160; Paulinietal. 


Yes 

5,224,163; Gasser etal. 


Yes 

5,227,797; Murphy 


Yes 

5,235,642; Wobberetal. 


Yes 

5,241,671; Reed etal. 


Yes 

5,245,165; Zhang 


Yes 

5,247.575; Sprague et al. 


Yes 

5,257,369; Skeen et al. 


Yes 

5,260,999; Wyman 


Yes 

5,263,158; Jams 


Yes 

5,265,164; Matyaset al. 

Y 

Yes 

5,276,735; Boebert et al. 


Yes 

5,280,479; Mary 


Yes 

5,285,494; Sprecher et al. 


Yes 

5,301,231; Abraham et al. 


Yes 

5,311,591; Fischer 


Yes 

5319,705; Halter etal. 


Yes 

5.319,785; Halter etal. 


Yes 

5,335,169; Chong 


Yes 

5,337,360; Fischer 


Yes 

5,341,429; Stringer et al. 


Yes 

5,343,527; Moore 


Yes 

5,347,579; Blandford 


Yes 

5,351,293; Michener et al. 

Y 

Yes 

5,355,474; Thuraisngham et al. 


Yes 

5,365,587; Campbell et al. 


Yes 

5,373,440; Cohen et al. 


Yes 

5,373,561; Haber etal. 


Yes 

5,390,247; Fischer 


Yes 

5,390,330; Talati 


Yes 

5,392,220; van den Hamer et al. 


Yes 

5,392,390; Crozier 


Yes 

5,394,469; Nagel etal. 


Yes 

5,410,598; Shear 


Yes 

5,412,717; Fischer 


Yes 

5,418,713; Allen 


Yes 

5,420,927; Micali 


Yes 

5,421,006; Jablon 


Yes 

5,422,953; Fischer 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 25 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

5,428,606; Moskowitz 


Yes 

5,438,508; Wyman 


Yes 

5,442,645; Ugon 


Yes 

5,444,779; Daniele 


Yes 

5,449,895; Hechtet al. 


Yes 

5,449,896; Hechtet al. 


Yes 

5,450.493; Maher 


Yes 

5,453,601; Rosen 


Yes 

5,453,605; Hechtet al. 


Yes 

5,455,407; Rosen 


Yes 

5,455,86 1 ; Faucher et al. 


Yes 

5,455,953; Russell 


Yes 

5,457,746; Dolphin 


Yes 

5,457,747; Drexler et al. 


Yes 

5,458,494; Krohn et al. 


Yes 

5,463,565; Cookson et al. 


Yes 

5,473,687; Lipscomb et al. 


Yes 

5,473,692; Davis 


Yes 

5,479,509; Ufion 


Yes 

5,485,622; Yamaki 


Yes 

5,491,800; Goldsmith et al. 


Yes 

5,497,479; Hombuckle 


Yes 

5,497,491; Mitchell etal. 


Yes 

5,499,298; Narasimhalu et aL 


Yes 

5,504,757; Cook etal. 


Yes 

5404,818; Okano 


Yes 

5404,837; Griffeth et al. 


Yes 

5,508,913; Yamamoto et al. 


Yes 

5409,070; Schull 


Yes 

5,513,261; Maher 


Yes 

5417,518; Rosen 


Yes 

5p30,235; Stefik et al. 


Yes 

5430,752; Rubm 


Yes 

5p33,123i rorce et al. 


Yes 

5,534,855; ^nockley et al. 


i es 

d 7 otetiK et al. 


1 Co 

J % JjJ % J£f£ty XlCWll 


Yes 

5,537426; Anderson et al. 


Yes 

5^39,735; Moskowitz 


Yes 

5,539,828; Davis 


Yes 

5,550,971; Brunner etal. 


Yes 

5,553,282; Parrish et al. 


Yes 

5457,518; Rosen 


Yes 

5,557,798; Skeenet al. 


Yes 

5,563,946; Cooper et al. 


Yes 

5,568452; Davis 


Yes 

5472,673; Shurts 


Yes 

5,592449; Naget etal. 


* Any possible "Y a s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 26 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Yes 

5,606,609; Houser et al. 


Yes 

5,613,004; Cooperman et al. 


Yes 

5,621,797; Rosen 


Yes 

5 629 770* Brassil et al. 


Yes 

5 629 980* Stefik et al 


Yes 

5 633 932- Davis et al 


Yes 

5 634 012* Stefik et al 


Yes 

5 636.292- Rhoads 


Yes 

5 638 443- Stefik et al 


Yes 

5,638,504; Scott et al. 


Yes 

5 640.546* GoDinath et al 


Yes 

5 655 077' Jones et al 


Yes 

5,678,170; Grube et al. 


Yes 

5,687,236; Moskowitz et al. 


Yes 

5 689.587' Bender et al 

Y 

Yes 

5 692 047* McManis 


Yes 

5 692 180- Lee 


Yes 

5 710 834* Rhoads 


Yes 

5 715 403* Stefik 


Yes 

5 721 788: Powell et al. 


Yes 

5 732 398* Taeawa 


Yes 

5 740 549* Reillvetal. 


Yes 

5 745 604* Rhoads 


Yes 

5 748 763* Rhoads 


Yes 

5.748.783: Rhoads 


Yes 

5 748 960* Fischer 


Yes 

5,754,849; Dyer et al. 


Yes 

5 757 914* McManis 


Yes 

5,75 8 , 1 52; LeTourneau 

Y 

Yes 

5,765,152; Erickson 


Yes 

5,768,426; Rhoads 


Yes 

5,774,872; Golden et al. 


Yes 

5,819,263; Bromley et al. 


Yes 

5,842,173; Strum etal. 


Yes 

BE9 00479 


Yes 

DE 3 803 982 


Yes 

DE3 803 982A1 


Yes 

EP 0 084 441 


Yes 

EP 0 084 441 Al 


Yes 

EP 0128 672 


Yes 

EP0 128 672 Al 


Yes 

EP0135 422 


Yes 

EP0 135 422 Al 


Yes 

EP 0180460 


Yes 

EP 0180 460 Al 


Yes 

EP 0 370 146 


Yes 

EP0 370 146 Al 


Yes 

EP0399 822 A2 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 27 


InterTmst Tech. Corp. v. Microsoft Corp. 
Case No- C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 




y'-'i/C'.' J' ^'/ : 0m00!&^ .'-V.'-'''' | 

L-iiL— i.: — — ^.v— ;~ — ! — ^-1— :^^±- ■ •■• ■■■■■■■ »■ —J 


Yes 

EP0421 409 


Yes 

EP042I 409 A2 


Yes 

EP0456 386 


Yes 

EP0456 386 A2 


Yes 

EP 0 469 864 


Yes 

EP 0 469 864 A2 


Yes 

EP0 469 864 A3 


Yes 

EP 0565 314 


Yes 

EP 0565 314 A2 


Yes 

EP0593 305 


Yes 

EP0593 305A2 


Yes 

EP0 651 554 


Yes 

EP0 651 554 Al 


Yes 

EP 0 668 695 


Yes 

EP 0 668 695 A2 


Yes 

EP 0 668 695 A3 


Yes 

EP 0 695 985 


Yes 

EP 0 695 985 Al 


Yes 

EP 0 696 798 


Yes 

EP 0 696 798 Al 


Yes 

EP 0 714 204 


Yes 

EP0714 204 A2 


Yes 

EP0 715 243 


Yes 

EP0 715 243 Al 


Yes 

EP0715 244 


Yes 

EP0715 244 Al 


Yes 

EP 0715 245 


Yes 

EP0715 245 Al 


Yes 

EP0715 246 


Yes 

EP0715 246 Al 


Yes 

EP0715 247 


Yes 

EP0715 247 Al 


Yes 

EP0 725 376 


Yes 

EP0 725 376 A2 


Yes 

EP0 749 081 


Yes 

EP0749 081 Al 


Yes 

EP0 763 936 


Yes 

EP0 763 936 A2 


Yes 

EP 0778 513 


Yes 

EP 0778 513 A2 


Yes 

EP0 795 873 


Yes 

EP 0795 873 A2 


Yes 

EP 0 800 312 


Yes 

EP 0 800 312 Al 


Yes 

GB 2,136,175 


Yes 

GB 2,264,796 


Yes 

GB 2,294,348 


Yes 

GB 2,295,947 


* Any possible "Y's that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 28 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

JP 01-068835 


Yes 

JP 02-242352 


Yes 

JP 02-247763 


Yes 

JP 02-294855 


Yes 

JP 04-369068 



TP OS- 181 7*U 


Yes 

jp 05-257783 


Yes 

JP 05-268415 


Yes 

JP 06-175794 


Yes 

JP 06-215010 


Yes 

JP 06-225059 


Yes 

JP 07-056794 


Yes 

JP 07-084852 


Yes 

JP 07-141138 


Yes 

JP 07-2003 17 


Yes 

JP 07-200492 


Yes 

JP 07-2446^9 


Yes 

JP 08-137795 


Yes 

JP 08-152990 


Yes 

JP 08-185292 


Yes 

JP 08-185298 


Yes 

JP 57-726 


Yes 

JP 62-241061 


Yes 

WO 85/02310 


Yes 

WO 85/03584 


Yes 

WO 90/02382 


Yes 

WO 92/06438 


Yes 

WO 92/22870 


Yes 

WO 93/01550 


Yes 

WO 94/01821 


Yes 

WO 94/03859 


Yes 

WO 94/06103 


Yes 

WO 94/16395 


Yes 

WO 94/18620 


Yes 

WO 94/22266 


Yes 

WO 94/27406 


Yes 

WO 95/14289 


Yes 

WO 96/00963 


Yes 

WO 96/03835 


Yes 

WO 96/05698 


Yes 

WO 96/06503 


Yes 

WO 96/13013 


Yes 

WO 96/21 192 


Yes 

WO 96/24092 


Yes 

WO 97/03423 


Yes 

WO 97/07656 


Yes 

WO 97/25816 


Yes | WO 97/32251 


* Any possible rt Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 29 


InterTmst Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 



Yes 


Amerke, David, et al, News Release, AT&T, Jan. 9, 1995, AT&T encryption 
system protects information services, 1 page. 


Yes 


Applications Requirements for Innovative Video Programming; How to Foster (or 
Cripple) Program Development Opportunities for Interactive Video Programs 
Delivered on Optical Media; A Challenge for the Introduction of DVD {Digital 
Video Disc) (19-20 Oct. 19 


Yes 


Argent Information Q&A Sheet, http://www.digiUl~watermarkcorn/ ( Copyright 
1995, The DICE Company, 7 pages. 


Yes 


Automation of Securities Markets and Regulatory Implications, Financial Market 
Trends, n50 f p. 20-33, Oct. 1991- [File 148, Gale Group Trade & Industry DB, 
DialogfR) commercial database] 


Yes 


Avery et al, Recommender Systems For Evaluating Computer Messages* 
CommunicaUons of the ACM, pp. 88-89 (Mar. 1997V 


Yes 


Background on the Administration's Telecommunications Policy Reform Initiative, 
News Release, The White House, Office of the President, Jan. 1 1, 1994 


Yes 


Baggett, Claude, Cable's Emerging Role in the Information Superhighway, Cable 
Labs, 13 slides. 


Yes 


Balabanovic et al, Content-based, Collaborative Recommendation, 
Commuriications of the ACM, pp. 66-72 (Mar. 1997). 


Yes 


Barassi, Theodore Sedgwick Esq., The Cybernotary: Public Key Registration and 
Certiftcaiton and Authentication of International Legal Transactions, 4 pages. 


Yes 


Barnes, Hugh, memo to Henry LaMuth, subject: George Gilder articles, May 31, 
1994. 


Yes 


Bart, Dan, Comments in the Matter of Public Hearing and Request for Comments 
on the International Aspects of the National Information Infrastructure, Before the 
Department of Commerce. Aug. 12. 1994. 


Yes 


Baum, Michael, Worldwide Electronic Commerce: Law, Policy and Controls 
Conference, program details, Nov, 11, 1993. 


Yes 


Best, Robert M., Digest of Papers, VLSI: New Architectural Horizons, Feb. 1980, 
Preventing Software Piracy With Crypto-Microprocessors, pp. 466-469. 


Yes 


Bisbey, Richard L., II and Gerald J Popek, Encapsulation: An Approach to 
Operating System Security, (USC/Information Science Institute, Marina Del Rey, 
CA) Oct. 1973, pp. 666-675. 


Yes 


Blom et al., Encryption Methods in Data Networks, Ericsson Technics, No. 2, 
1978, Stockholm, Sweden. 


Yes 


Burner, Rick E„ "Power Agent, NetBot help advertisers reach Internet shoppers,* 
Aug. 1997 (Document from Internet). 


Yes 


Cable Television and America's Telecommunications Infrastructure, (National 
Cable Television Association, Washington, D.C), Apr. 1993, 19 pages. 


Yes 


Caruso. Denise, Technology, Digital Commerce: 2 plans for watermarks, which can 
bind proof of authorship to electronic works, N.Y. Times, Aug. 7, 1995, p. D5. 


Yes 


CD ROM, Introducing . . . The Workflow CD-ROM Sampler, Creative Networks, 
MCIMail: Creative Networks, Inc., Palo Alto, California. 


* Any possible "Y-s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 30 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 



l <;.^y •': " ■■■■7 •.;<¥' f- 'tlpSM^*'- • ' ■ ' \:>C • i> ^ '. -\ 


Yes 

CGI Common Gateway Interface Document from the Internet, 
<cgi@ncsa.uiuc.edu>. 1996. 1 page. 


Yes 

Chase, Chevy, M.D., DiscStore (Electronic Publishing Resources 1991). 

Y 

Yes 

Chondhury, et al., "Copyright Protection for Electronic Publishing over Computer 
Networks/' AT&T Bell Laboratores, Murray Hill, New Jersey 07974 (Jun. 1994). 


Yes 

Clark, Tim, Ad service gives cash back, Document from the Internet: 
<vmw.news.com./News/Item/O l 4 t l3050 l OO.htniI> (visited Aug. 4, 1997), 2 pages. 


Yes 

Codercard, Spec Sheet-Basic Coder Subsystem (Interstate Electronics Corp., 
Anaheim, CA), (undated) 4 pages. 


Yes 

Collection of documents including: Protecting Electronically Published Properties, 
Increasing Publishing Profits, (Electronic Publishing Resources Inc.) Jan. 1993, 25 
paces. 


Yes 

Communications of the ACM, Intelligent Agents, Jul. 1994, vol. 37, No. 7. 


Yes 

Communications of the ACM, Jun. 1996, vol. 39, No. 6. 


Yes 

Computer Systems Policy Project (CSSP), Perpsectives on the National 
Information Infrastructure: Ensuring Interoperability (Feb. 1994), Feb. 1994. 


Yes 

Cunningham, Donna, et al., News Release, AT&T, Jan. 31, 1995, AT&T, VLSI 
Technology ioin to improve info highway security, 3 pages. 


Yes 

Data Sheet, About the Digital Notary Service, Surety Technologies, Inc., 1994- 
1995, 6 pages. 


I Co 

Dempsey, et al., "The Warwick Metadata Workshop: A Framework for the 
Deployment of Resource Description", D-Lib Magazine, Jul. 15, 1996. 


Yes 

Denning et al. f Data Security, 1 1 Computing Surveys No. 3, Sep. 1979, pp. 227- 
249. 


Yes 

Diffie, Whitfield and Martin E. Hellman, IEEE Transactions on Information 
Theory, vol. 22, No. 6, Nov. 1976, New Directions in Cryptography, pp. 644-651. 


Yes 

Diffie, Whitfield and Martin E. Hellman, Proceedings of the IEEE, vol. 67, No. 3, 
Mar. 1979, Privacy and Authentication: An Introduction to Cryptography, pp. 397- 
427. 


Yes 

DSP5 6000/DSP5600 1 Digital Signal Processor Usefs Manual, Motorola, 1990, pp. 
2-2. 


Yes 

Dusse, Stephen R- and Burton S. Kaliski, A Cryptographic Library for the 
Motorola 56000 in Damgard, I. M., Advances in Cryptology-Proceedings 
Eurocrvpt 90, Springer- Verlag. 1991. dd. 230-244. 


Yes 

Dyson, Esther, Intellectual Value, Wired Magazine, Jul. 1995 7 pp. 136-141 and 182 
184. 


Yes 

EDS Provides PowcrAgent with Internet Services to Support One-to-One 
Marketing (PowerAgent Inc. 1997, no later than Aug. 13, 1997). 


Yes 

EFFector Online vol. 6 No* 6, "A Publication of the Electronic Frontier 
Foundation," 8 pages, Dec. 6, 1993. 


Yes 

EIA and TIA White Paper on National Information Infrastructure, published by the 
Electronic Industries Association and the Telecommunications Industry 
Association, Washington, D.C., no date. 


* Any possible u Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 31 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SB A (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

Electronic Currency Requirements, XIWT (Cross Industry Working Group), (no 
date). 


Yes 

Electronic Publishing Resources Inc. Protecting Electronically Published Properties 
Increasing Publishing Profits (Electronic Publishing Resources 1991). 


xes 

Firefly Network, Inc., www.ffly.com, What is Firefly? Firefly revision: 4L4 
Copyright 1995, 1996. 


Yes 

First CII Honeywell Bull International Symposium on Computer Security and 
Confidentiality, Jan. 26-28, 1981, Conference Text, pp. 1-2L 


Yes 

Framework for National Information Infrastructure Services, Draft, U.S. 
Department of Commerce, Jul. 1994. 


Yes 

Framework for National Information Infrastructure Services, NIST, Jul. 1994, 12 
slides. 


Yes 

Garcia, D. Linda, Science, space and technology, Hearing before Subcomm. on 
Technology, Environment, and Aviation, May 26, 1994 (testimony of D. Linda 
Garcia). 


Yes 

Gleick, James, Dead as a Dollar, The New York Times Magazine, Jun. 16, 1996, 
Section 6, pp. 26-30, 35, 42, 50. 54. 


Yes 

Greguras, Fred, Softie Symposium *95, Copyright Clearances and Moral Rights, 
Nov. 30, 1995 (as updated Dec. 11, 1995), 3 pages. 


Yes 

Guillou, Louis C, Smart Cards and Conditional Access, Advances in Cryptography- 
-Proceedings of EuroCrypt 84 (T. Beth et al, Ed., Springer- Verlag, 1985) pp. 480- 
490. 


Yes 

Haar, Steven Vonder, PowerAgent Launches Commercial Service, Interactive 
Week Aug. 4, 1997, (Document from the Internet) 1 page. 


Yes 

Harman, Harry H., Modern Factor Analysis, Third Edition Revised, University of 
Chicago Press, Chicago and London, 1976. 


Yes 

Hearst, Interfaces For Searching the Web Scientific American pp. 68-72 (Mar, 
1997). 


Yes 

Herzberg, Amir et al., Public Protection of Software, ACM Transactions on 
Computer Systems, vol. 5. No. 4, Nov. 1987, pp. 371-393. 


Yes 

Hofmann, Jud, Interfacing the NH to User Homes, (Consumer Electronic Bus. 
Corrirnittee) NIST. Jul. 1994 T 12 slides. 


X Co 

Hofmann, Jud, Interfacing the Nil to User Homes, Electronic Industries 
Association, Consumer Electronic Bus Committee, 14 slides, no date. 


Yes 

Holt, Stannie, Start-up promises user confidentiality in Web marketing service, Info 
World Electric, Aug. 13, 1997 (Document from Internet)/ (Infoworld Publishing 
Co. Aug. 4, 1997). 


Yes 

HotJava.TM.: The Security Story Document from the Internet, (no date) 4 pages. 


Yes 

How Can I Put an Access Counter on My Home Page?, World Wide Web FAQ, 
1996, 1 page. 


Yes 

Multimedia Mixed Objects Envelopes Supporting a Graduated Fee Scheme Via 
Encryption, IBM Technical Disclosure Bulletin, vol. 37, No. 3, Mar. 1, 1994, pp. 
413-417, XP000441522. 


Yes 

Transformer Rules Strategy for Software Distribution Mechanism-Support 
Products, IBM Technical Disclosure Bulletin, vol. 37, No. 48, Apr. 1994, pp. 523- 
525,XP000451335. 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 32 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

ESP Break Out Session Report for Group No. 3, Standards Development and 
Tracking System, no date. 


Yes 

Information Infrastructure Standards Panel: Nil "The Information Superhighway w t 
NationsBank--HGDeal-ASC X9, (no date). 15 pages. 


Yes 

Intellectual Property and the National Information Infrastructure, a Preliminary 
Draft of the Report of the Working Group on Intellectual Property Rights, Green 
paper. Jul. 1994. 141 pages. 


Yes 

Invoice? What's an Invoice?, Business Week, Jun. 10, 1996, pp. 1 10-1 12. 


Yes 

Is Advertising Really Dead?, Wired 1,02, Part 2, 1994. 


Yes 

Javasoft, Frequently Asked Questions-Applet Security, What's Jaya.TM.? Products 
and Services, Java/Soft News, Developer's Cornier, Jun. 7, 1996, 8 pages, 
Document from Internet, <iava@iava.sun.com> 


Yes 

Jiang, et ai, A concept-Based Approach to Retrieval from an Electronic Industrial 
Directory, International Journal of Electronic Commerce, vol. 1, No. 1, Fall 1996, 
do.51-72. 


Yes 

Jones, Debra, Top Tech Stories, PowerAgent Introducts First Internet 
"Infomediary" to Empower and Protect Consumers, Aug. 13, 1997, 3 pages 
(Document from Internet). 


Yes 

Kautz, Referral Web: Combining Social Networks and Collaborative Filtering, 
Communications of the ACM, pp. 63-65 (Mar. 1997). 


Yes 

Kelly, Kevin, Whole Earth Review, E-Money, pp. 40-59, Summer 1993. 


Yes 

Kent, Stephen Thomas, Protecting Externally Supplied Software in Small 
Computers, (MIT/LCS/TR-255) Sep. 1980, 254 pages. 


Yes 

Kohntopp, M., Sag's durch die Blume, Apr. 1996, marit@schulung.netuse.de 


Yes 

Konstan et al, Applying Collaborative Filtering to Usenet News, Communications 
of the ACM, pp. 77-87 (Mar. 1997). 


Yes 

Kristol et al.. Anonymous Internet Mercantile Protocol, AT&T Bell Laboratories, 
Murray Hill, New Jersey, Draft: Mar. 17, 1994. 


Yes 

Lago2e, Carl, D-Lib Magazine, JmVAug. 1996, The Warwick Framework, A 
Container Architecture for Diverse Sets of Metadata. 


Vac 

i es 

Lanza, Mike, electronic mail, George Gilder's Fifth Article-Digital Darkhorse— 
Newspapers, Feb. 21, 1994. 


Yes 

Levy, Steven, E-Money, That's What I want, WIRED, Dec. 1994, 10 pages. 


Yes 

Low et al., Anonymous Credit Cards and its Collusion Analysis, AT&T Bell 
Laboratories, Murray Hill, New Jersey, Oct 10, 1994. 


Yes 

Low et aL, Anonymous Credit Cards, AT&T Bell Laboratories, Proceedings of the 
2nd ACM Conference on Computer and Communications Security, Fairfax, 
Virginia, Nov. 2-4, 1994. 


Yes 

Low et al., Document Marking and Identification using both Line and Word 
Shifting, AT&T Bell Laboratories, Murray Hill, New Jersey, Jul. 29, 1994. 


Yes 

Lynch, Searching the Internet Scientific American pp. 52-56 (Mar. 1997). 


Yes 

Maclachlan, Malcolm, PowerAgent Debuts Spam-Free Marketing, TechWire, Aug. 
13, 1997, 3 pages (Document from Internet). 


Yes 

Maxemchuk, Electronic Document Distribution, AT&T Bell Laboratories, Murray 
Hill, New Jersey 07974. 


Yes 

Micro Card (Micro Card Technologies, Inc., Dallas, TX), (no date), 4 pages. 


Yes 

Milbrandt, Eric, Stenanography Info and Archive, 1996, 2 pages. 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 33 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 





Y 

Yes 

Mori, Ryoichi and Masaji Kawahara, Superdistribution: The Concept and the 
Architecture, The Transactions of the EIEICI, V, E73, No. 7, Tokyo, Japan, Jul. 
1990. 


Yes 

Mossberg, Walter $., Personal Technology, Threats to Privacy On-line Become 
More Worrisome, Wall Street Journal, Oct. 24, 1996. 


Yes 

Negroponte, Nicholas, Electronic Word of Mouth, Wired, Oct. 1996, p. 218. 


Yes 

Negroponte, Nicholas, Some Thoughts on Likely and Expected Communications 
Scenarios: A Rebuttal, Telecommunications, Jan. 1993, pp. 41-42. 


Yes 

Neumann, et al., A Provably Secure Operating System: The System, Its 
Applications, and Proofs, Computer Science Labortory Report CSL-1 16, Second 
Edition, SRI International (Mav 1980). 


Yes 

New Products, Systems and Services, AT&T Technology, vol. 9, No. 4, (undated), 
pp. 16-19. 


Yes 

News from The Document Company Xerox, Xerox Announces Software Kit for 
Creating Working Documents with Dataglyphs Document from Internet, Nov. 6, 
1995, 13 pages. 


Yes 

Nil, Architecture Requirements, XIWT, (no date). 


Yes 

Open System Environment Architectural Framework for National Information 
Infrastructure Services and Standards, in Support of National Class Distributed 
Systems, Distributed System Engineering Program Sponsor Group, Draft 1.0, Aug. 
5. 1994. 


Yes 

Pelton, Dr. Joseph N., Telecommunications, Why Nicholas Negroponte is Wrong 
About the Future of Telecommunication, pp. 35-40, Jan. 1993. 


Yes 

Portland Software's ZipLock, Internet Information, Copyright Portland Software, 
1996-1997. 12 pages. 


Yes 

PowerAgent Introduces First Internet v Infomediary v to Empower and Protect 
Consumers (PowerAgent Inc. Aug. 4, 1997). 


Yes 

PowerAgent Introduces First Internet x lnfomediary* to Empower and Protect 
Consumers (PowerAgent Inc., 1997 (no later than Aug. 13, 1997). 


Yes 

PowerAgent Introduces First Internet "Infomediary" to Empower and Protect 
Consumers (Tech Talk Aug. 4, 1997). 


Yes 

PowerAgent Introduces First Internet ^Infomediary* to Empower and Protect 
Consumers (Techmall.com, Aug. 4, 1997), 


Yes 

PowerAgent Introduces Internet's First True 1:1 Marketing Network (PowerAgent 
Inc.. Aug. 4, 1997). 


Yes 

PowerAgent Press Releases, "What the Experts are Reporting on PowerAgent," 
Aug. 13, 1997, 3 pages (Document from Internet). 


Yes 

PowerAgent Press Releases, What the Experts are Reporting on PowerAgent, Aug- 
13, 1997, 6 pages (Document from Internet). 


Yes 

PowerAgent Press Releases, What the Experts are Reporting on PowerAgent, Aug. 
4, 1997, 5 pages (Document from Internet). 


Yes 

Premenos Announces Templar 2.0-Next Generation Software for Secure Internet 
EDI, Document from Internet: <wcbmaster@templar.ner>, Jan. 17, 1996, 1 page. 


* Any possible "Vs that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 34 


InterTnist Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 



Yes 

Premenos Corp. White Paper: The Future of Electronic Commerce, A Supplement 
to Midrange Systems, Document from Internet, <webiriaster@premenos.com>, 
4 pages, no date. 


Yes 

Press Release, "National Semiconductor and EPR Partner For Information 
MeterimVData Security Cards" (Mar. 4, 1994). 


ICS 

Proper Use of Consumer Information on the Internet, Document from the Internet, 
White Paper, (PowerAeent Inc., Melo Park, CA) Jun. 1997, 9 pages. 


Yes 

Rankine, Gordon, "Thomas—A Complete Single-Chip RSA Device," Advances in 
Cryptography, Proceedings of Crypto 86, pp. 48CM87 (A.M. Odlyzko Ed., 
Springer- Verlae 1987V 


Yes 

Reilly, Arthur K. t Standards committee Tl -Telecommunications, Input to the 
'International Telecommunications Hearings," Panel 1: Component Technologies 
of the NII/GIL no date. 


Yes 

Resnick, et aL, Recommender Systerns,Cornmunications of the ACM, vol. 40, No. 
3, Mar. 1997. pp. 56-89. 


Yes 

Resnick, Filtering the Information On the Internet Scientific American pp. 62-64 
(Mar. 1997). 


I CS 

ROI-Solving Critical Electronic Publishing Problems (Personal Library Software, 
1987 or 1988). 


Yes 

Rose, Lance, Cyberspace and the Legal Matrix: Laws or Confusion?, 1991. 


I 

Rosenthal, Steve, Interactive Newtork: Viewers Get Involved, New Media, Dec. 
1992, pp. 30-31. 


ICS 

Rosenthal, Steve, Interactive TV: The Gold Rush is on, New Media, Dec. 1992, pp. 
27-29. 


Yes 

Rosenthal Steve, Mega Channels, New Media, Sep. 1993, pp. 36-46. 


Yes 

Rothstein, Edward, Technology, Connections, Making the Internet come to you 
through *push x technology, New York Times, Jan. 20, 1997, p. D5. 


Yes 

Rucker et al, Personalized Navigation For the Web, Communications of the ACM, 
pp. 73-75 (Mar. 1997). 


Yes 

Rutkowski, Ken, PowerAgent Introduces First Internet N Infomediary N to Empower 
and Protect Consumers, Tech Talk News Story, Aug. 4 T 1997, 1 page. (Document 
from Internet 1 ) 


Yes 

Sager, Ira (Edited by), Bits & Bytes, Business Week, Sep. 23, 1996, p. 142E. 


Yes 

Schlosstein, Steven, America: The G7's Comeback Kid, Internationa] Economy, 
JunTJul. 1993, 5 pages. 


Yes 

Schurmann, Jurgen, Pattern Classification, A Unified View of Statistical and 
Neural Approaches, John Wiley & Sons, Inc., 1996. 


Yes 

Scnaumueller-BichI, Ingrid, et al., A Method of Software Protection Based on the 
Use of Smart Cards and Cryptographic Techniques, (undated), 9 pages. 


Yes 

Serving the Community: A Public-Interest Vision of the National Information 
Infrastructure, Computer Professionals for Social Responsibility, Executive 
Summary, no date. 


Yes 

Shear, Victor, Solutions for CD-ROM Pricing and Data Security Problems, pp. 530 
533, CD ROM Yearbook 1988-1989) (Microsoft Press 1988 or 1989). 


* Any possible "Y"s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 35 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

Siuda, Karl, Security Services in Telecommunications Networks, Seminar; 
Mapping New Applications Onto New Technologies, edited by B. Plattner and P 
Gunzbureer; Zurich, Mar. 8-10, 1988, pp. 45-52, XP000215989. 


I es 

Smith, Sean and J.D. Tyger, Signed Vector Timestamps: A Secure Protocol for 
Partial Order Time, CMU-93-1 16, School of Computer Science Carnegie Mellon 
University, Pittsburgh, Pennsylvania, Oct. 1991; version of Feb. 1993, 15 pages. 


ICS 

Special Report, "The Internet: Fulfilling the Promise"; Lynch, Clifford; "The 
Internet Bringing Order From Chaos"; Resnick, Paul; "Search the Internet", Hearst, 
Marti A; "Filtering Information on the Internet"; Stefik, Mark; "Interfaces for 
Searching the 


1 Co 

Stefik, Mark, Introduction to Knowledge Systems, Chapter 7, Classification 
(Morgan Kaufmann Publishers. Inc., 1995) pp. 543-607. 


I Ci> 

Stefik, Mark, Letting Loose the Light: Igniting Commerce in Electronic 
Publication, (Xerox PARC, Palo Alto, CA) 1994-1995, 35 pages. 


Yes 

Stefik, Mark, Letting Loose the Light: Igniting Commerce In Electronic 
Publication, Internet Dreams: Archetypes, Myths, and Metaphors. Massachusetts 
Institute of Technoloev. 1996. pp. 219-253. 


Yes 

Stefik, Trusted Systems Scientific American pp. 78-81 (Mar. 1997). 


Yes 

Stephenson, Tom, Advanced Imaging, The Info Infrastructure Initiative: Data 
SuperHtehways and You, pp. 73-74. May 1993. 


res 

Sterling, Bruce, "Literary freeware: Not for Commercial Use", remarks at 
Computers, Freedom and Privacy Conference IV, Chicago, Mar. 26, 1994. 


Yes 

Struif, Bruno, The Use of Chipcards for Electronic Signatures and Encryption, 
Proceedings for the 1989 Conference on VLSI and Computer Peripherals, IEEE 
Computer Society Press. 1989, pp. (4)155-(4)158. 


Y^« 
I c» 

Templar Software and Services: Secure, Reliable, Standards-Based EDI Over the 
Internet, Prementos, Internet info@templar.net, J page. 


Yes 

Templar Overview,: Premenos, Internet info@templar.net, 4 pages. 


Yes 

Terveen et al, A System For Sharing Recommendations, Communications of the 
ACM, pp. 59-62 (Mar. 1997). 


Yes 

The 1:1 Future of the Electronic Marketplace: Return to a Hunting and Gathering 
Society, 2 pages, no date. 


Yes 

The Benefits of ROI For Database Protection and Usage Based Billing (Personal 
Library Software, 1987 or 1988). 


Yes 

The New Alexandria No. 1, Alexandria Institute, pp. 1-12, Jul.- Aug. 1986. 


Yes 

This Web Agent Knows What You Like, Business Week, p. 142E (Sep, 23, 1996). 


Yes 

Tygar, J.D. and Bennet Yee, Cryptography: It's Not Just For Electronic Mail 
Anymore, CMU-CS-93-107, School of Computer Science Carnegie Mellon 
University, Pittsburgh, PA, Mar. 1, 1993. 21 pages. 


Yes 

Tygar, J.D. and Bennet Yee, Dyad: A System for Using Physically Secure 
Coprocessors, School of Computer Science, Carnegie Mellon University, 
Pittsburgh, PA (undated), 41 pages. 


Yes 

Tygar, J.D, and Bennet Yee, Dyad: A System for Using Physically Secure 
Coprocessors, School of Computer Science, Carnegie Mellon University, 
Pittsburgh. PA, May 1991, 36 pages. 


* Any possible D Y n s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 36 


InterTrust Tech. Corp. v. Microsoft Corp. 
Case No. C 01-1640 SBA (MEJ) 


APPENDIX OF PRIOR ART* 






Yes 

Valovic, T., The Role of Computer Networking in the Emerging Virtual 
Marketplace, Telecommunications, (undated), pp. 40-44. 


Yes 

Voight, Joan, Beyond the Banner, Wired, Dec. 1996, pp. 196, 200, 204. 

Y 

Yes 

Weber, Metering Technologies for Digital Intellectual Property, A Report to the 
International Federation of Reproduction Rights Organisations, pp 1-29; Oct. 1994, 
Boston, MA, USA. 

Y 

Yes 

Weber, Robert, Digital Rights Management Technologies, A Report to the 
International Federation of Reproduction Rights Organisations, Northeast 
Consulting Resources. Inc., Oct. 1995. 49 pages. 


Yes 

Weber, Robert, Document from the Internet: Digital Rights Management 
Technologies, Oct. 1995, 21 pages. 


Yes 

Weder, Adele, Life on the Infohighway, INSITE, (no date), pp. 23-25. 


Yes 

Weingart, Steve H., Physical Security for the ABYSS System, (IBM Thomas J. 
Watson Research Center, Yorktown Heights, NY), 1987, pp. 52-58. 


Yes 

Weitzner, Daniel J., A Statement on EFFs Open Platform Campaign as a Nov., 
1993, 3 pa^es. 


Yes 

WEPIN Store, Stenography (Hidden Writing), Document from Internet (Common 
Law), 1995, 1 page. 


Yes 

White, Steve R. ( ABYSS: A Trusted Architecture for Software Protection, (IBM 
Thomas J. Watson Research Center, Yorktown Heights, NY), 1987, pp. 38-50. 


Yes 

XIWT Cross Industry Working Team, 5 pages, Jul 1994. 


Yes 

Yee, Bennet, Using Secure Coprocessors, CMU-CS-94-149, School of Computer 
Science, Carnegie Mellon University, Pittsburgh, PA, 1994, 94 pages. 


Yes 

YeJJin, Frank, Document from the Internet: Low Level Security in Java, Sun 
Microsystems, 1996, 8 pages. 


* Any possible "Y n s that were missed shall not negate the anticipatory nature of a reference, particularly where 
there is a chart in Appendix B. 37